All the vulnerabilites related to intel - server_board_s2600wt2
Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Buffer overflow in a verification process for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F430AA-ECCD-4991-9178-FB7A970B800C",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2F0E72B-986D-47C2-8A91-9071C8D374D9",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E7ADD13-9BDA-441B-8034-DFC7D916A5CF",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D756005-D507-48D2-8032-D6CA8B404BE7",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A1051E-2A0B-4EBB-A8B5-C12673CE3809",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E443F234-9F18-42F6-854D-3F5A041E5AA3",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "00A36EA5-DBF1-46D7-A6E8-01F3C971E791",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F14DD88-F7DD-49C6-A02E-270BA3D6C368",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CDA2F1B-4157-4B9F-94A4-42ADD662E667",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34B1B9B2-57E1-4A6C-B5B8-F37EA7B8A792",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "812D54CF-2239-4DC6-9E5C-A8A9A8137484",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04498E65-4040-4C6A-A3D3-645B1291EF27",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C2B835-62E5-4234-A537-23C06363C99C",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0EE3C5-D366-4328-8219-859AED3DB889",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF6A2EC-A08E-4BA1-B935-E105CBACC0AD",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B07FAEA5-01FB-4F72-BBE0-901878476506",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "417A4480-1225-4264-B69E-33A89BBA4CFA",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CD6EE2-3897-4176-B3B0-B810D0C4A717",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in a verification process for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en un proceso de verificaci\u00f3n para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a  2.45, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8712",
  "lastModified": "2024-11-21T05:39:18.763",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.367",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en un subsistema para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8718",
  "lastModified": "2024-11-21T05:39:19.537",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.727",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Invalid pointer for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Invalid pointer for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Un puntero no v\u00e1lido para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8715",
  "lastModified": "2024-11-21T05:39:19.137",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.557",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-763"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Improper access control for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inapropiado para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8716",
  "lastModified": "2024-11-21T05:39:19.260",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.603",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 04:15
Modified
2024-11-21 05:39
Summary
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en un subsistema para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario con privilegios habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8720",
  "lastModified": "2024-11-21T05:39:19.843",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T04:15:14.240",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Buffer overflow in subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en un subsistema para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8719",
  "lastModified": "2024-11-21T05:39:19.690",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.807",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Cross-site scripting for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de tipo cross-site scripting para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-8723",
  "lastModified": "2024-11-21T05:39:20.283",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 5.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 6.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.1,
        "impactScore": 3.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:16.007",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Improper authentication in socket services for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F430AA-ECCD-4991-9178-FB7A970B800C",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2F0E72B-986D-47C2-8A91-9071C8D374D9",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E7ADD13-9BDA-441B-8034-DFC7D916A5CF",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D756005-D507-48D2-8032-D6CA8B404BE7",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A1051E-2A0B-4EBB-A8B5-C12673CE3809",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E443F234-9F18-42F6-854D-3F5A041E5AA3",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "00A36EA5-DBF1-46D7-A6E8-01F3C971E791",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F14DD88-F7DD-49C6-A02E-270BA3D6C368",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CDA2F1B-4157-4B9F-94A4-42ADD662E667",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34B1B9B2-57E1-4A6C-B5B8-F37EA7B8A792",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "812D54CF-2239-4DC6-9E5C-A8A9A8137484",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04498E65-4040-4C6A-A3D3-645B1291EF27",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C2B835-62E5-4234-A537-23C06363C99C",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0EE3C5-D366-4328-8219-859AED3DB889",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF6A2EC-A08E-4BA1-B935-E105CBACC0AD",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B07FAEA5-01FB-4F72-BBE0-901878476506",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "417A4480-1225-4264-B69E-33A89BBA4CFA",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CD6EE2-3897-4176-B3B0-B810D0C4A717",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper authentication in socket services for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una autenticaci\u00f3n inapropiada en los servicios de socket para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 2.45, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-8709",
  "lastModified": "2024-11-21T05:39:18.393",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.180",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Buffer copy without checking size of input for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer copy without checking size of input for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "La copia del b\u00fafer sin comprobar el tama\u00f1o de entrada para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8729",
  "lastModified": "2024-11-21T05:39:20.460",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:16.070",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en un subsistema para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8722",
  "lastModified": "2024-11-21T05:39:20.157",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.947",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Buffer overflow in daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en un demonio para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-8707",
  "lastModified": "2024-11-21T05:39:18.150",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.040",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Una autenticaci\u00f3n inapropiada para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8714",
  "lastModified": "2024-11-21T05:39:19.010",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.493",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Heap-based overflow for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based overflow for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento en la regi\u00f3n heap de la memoria para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59 puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8730",
  "lastModified": "2024-11-21T05:39:20.580",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:16.150",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Incorrect execution-assigned permissions in the file system for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Incorrect execution-assigned permissions in the file system for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Unos permisos asignados en una ejecuci\u00f3n incorrecta en el sistema de archivos para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, pueden permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8731",
  "lastModified": "2024-11-21T05:39:20.710",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:16.210",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una autenticaci\u00f3n inapropiada para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-8713",
  "lastModified": "2024-11-21T05:39:18.893",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.430",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Improper access control in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F430AA-ECCD-4991-9178-FB7A970B800C",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2F0E72B-986D-47C2-8A91-9071C8D374D9",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E7ADD13-9BDA-441B-8034-DFC7D916A5CF",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D756005-D507-48D2-8032-D6CA8B404BE7",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A1051E-2A0B-4EBB-A8B5-C12673CE3809",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E443F234-9F18-42F6-854D-3F5A041E5AA3",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "00A36EA5-DBF1-46D7-A6E8-01F3C971E791",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F14DD88-F7DD-49C6-A02E-270BA3D6C368",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CDA2F1B-4157-4B9F-94A4-42ADD662E667",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34B1B9B2-57E1-4A6C-B5B8-F37EA7B8A792",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "812D54CF-2239-4DC6-9E5C-A8A9A8137484",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04498E65-4040-4C6A-A3D3-645B1291EF27",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C2B835-62E5-4234-A537-23C06363C99C",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0EE3C5-D366-4328-8219-859AED3DB889",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF6A2EC-A08E-4BA1-B935-E105CBACC0AD",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B07FAEA5-01FB-4F72-BBE0-901878476506",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "417A4480-1225-4264-B69E-33A89BBA4CFA",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CD6EE2-3897-4176-B3B0-B810D0C4A717",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inapropiado en el cargador de arranque para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules  versiones anteriores a  2.45, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8711",
  "lastModified": "2024-11-21T05:39:18.640",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.290",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Buffer overflow in a daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in a daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en un demonio para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-8706",
  "lastModified": "2024-11-21T05:39:18.010",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:14.977",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Improper input validation in a subsystem for some Intel Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in a subsystem for some Intel Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada en un subsistema para algunos Intel Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8717",
  "lastModified": "2024-11-21T05:39:19.387",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.663",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2023-05-12 15:15
Modified
2024-11-21 08:00
Summary
Improper access control in the Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family with the BIOS version 0016 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s1200v3rpl_firmware *
intel server_board_s1200v3rpl -
intel server_board_s1200v3rpm_firmware *
intel server_board_s1200v3rpm -
intel server_board_s1200v3rpo_firmware *
intel server_board_s1200v3rpo -
intel server_board_s1200v3rps_firmware *
intel server_board_s1200v3rps -
intel server_board_s1400fp2_firmware *
intel server_board_s1400fp2 -
intel server_board_s1400fp4_firmware *
intel server_board_s1400fp4 -
intel server_board_s1400sp4_firmware *
intel server_board_s1400sp4 -
intel server_board_s1400sp2_firmware *
intel server_board_s1400sp2 -
intel server_board_s1600jp2_firmware *
intel server_board_s1600jp2 -
intel server_board_s1600jp4_firmware *
intel server_board_s1600jp4 -
intel server_board_s2400bb4_firmware *
intel server_board_s2400bb4 -
intel server_board_s2400bb4_firmware *
intel server_board_s2400bb4 -
intel server_board_s2400ep2_firmware *
intel server_board_s2400ep2 -
intel server_board_s2400ep4_firmware *
intel server_board_s2400ep4 -
intel server_board_s2400sc2_firmware *
intel server_board_s2400sc2 -
intel server_board_s2600co4_firmware *
intel server_board_s2600co4 -
intel server_board_s2600coe_firmware *
intel server_board_s2600coe -
intel server_board_s2600coeioc_firmware *
intel server_board_s2600coeioc -
intel server_board_s2600cp2_firmware *
intel server_board_s2600cp2 -
intel server_board_s2600cp2ioc_firmware *
intel server_board_s2600cp2ioc -
intel server_board_s2600cp2j_firmware *
intel server_board_s2600cp2j -
intel server_board_s2600cp4_firmware *
intel server_board_s2600cp4 -
intel server_board_s2600cp4ioc_firmware *
intel server_board_s2600cp4ioc -
intel server_board_s2600gl_firmware *
intel server_board_s2600gl -
intel server_board_s2600gz_firmware *
intel server_board_s2600gz -
intel server_board_s2600ip4_firmware *
intel server_board_s2600ip4 -
intel server_board_s2600ip4l_firmware *
intel server_board_s2600ip4l -
intel workstation_board_w2600cr2_firmware *
intel workstation_board_w2600cr2 -
intel workstation_board_w2600cr2l_firmware *
intel workstation_board_w2600cr2l -
intel server_board_s2600jf_firmware *
intel server_board_s2600jf -
intel server_board_s2600wp_firmware *
intel server_board_s2600wp -
intel server_board_s4600lh2_firmware *
intel server_board_s4600lh2 -
intel server_board_s4600lt2_firmware *
intel server_board_s4600lt2 -
intel server_board_s2600wpf_firmware *
intel server_board_s2600wpf -
intel server_board_s2600wpq_firmware *
intel server_board_s2600wpq -
intel server_board_s2600jff_firmware *
intel server_board_s2600jff -
intel server_board_s2600jfq_firmware *
intel server_board_s2600jfq -
intel server_board_s2600cw2r_firmware *
intel server_board_s2600cw2r -
intel server_board_s2600cw2sr_firmware *
intel server_board_s2600cw2sr -
intel server_board_s2600cwtr_firmware *
intel server_board_s2600cwtr -
intel server_board_s2600cwtsr_firmware *
intel server_board_s2600cwtsr -
intel server_board_s2600cw2s_firmware *
intel server_board_s2600cw2s -
intel server_board_s2600cwt_firmware *
intel server_board_s2600cwt -
intel server_board_s2600cwts_firmware *
intel server_board_s2600cwts -
intel server_board_s2600cw2_firmware *
intel server_board_s2600cw2 -
intel server_board_s2600kpfr_firmware *
intel server_board_s2600kpfr -
intel server_board_s2600kpr_firmware *
intel server_board_s2600kpr -
intel server_board_s2600kptr_firmware *
intel server_board_s2600kptr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf_firmware *
intel server_board_s2600kpf -
intel server_board_s2600tpnr_firmware *
intel server_board_s2600tpnr -
intel server_board_s2600tpfr_firmware *
intel server_board_s2600tpfr -
intel server_board_s2600tpr_firmware *
intel server_board_s2600tpr -
intel server_board_s2600tpf_firmware *
intel server_board_s2600tpf -
intel server_board_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600wtts1r_firmware *
intel server_board_s2600wtts1r -
intel server_board_s2600wt2r_firmware *
intel server_board_s2600wt2r -
intel server_board_s2600wttr_firmware *
intel server_board_s2600wttr -
intel server_board_s2600wt2_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wtt_firmware *
intel server_board_s2600wtt -
intel server_board_s1200btlrm_firmware *
intel server_board_s1200btlrm -
intel server_board_s1200btlr_firmware *
intel server_board_s1200btlr -
intel server_board_s1200btsr_firmware *
intel server_board_s1200btsr -
intel server_board_s1200btl_firmware *
intel server_board_s1200btl -
intel server_board_s1200bts_firmware *
intel server_board_s1200bts -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200v3rpl_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EA8F7D9-3DF4-4DFB-A311-EF6BEAD6D1FF",
              "versionEndExcluding": "0006",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200v3rpl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EDBA5EE-61D6-41B0-AF8D-D491FA0E1635",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200v3rpm_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0EA133C-D648-4FAB-8F79-92DD20ADE963",
              "versionEndExcluding": "0006",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200v3rpm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9201A546-F9EE-401B-872C-F3B6459C544A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200v3rpo_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "97D1D231-3D63-44E6-9017-16CF97D26C08",
              "versionEndExcluding": "0006",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200v3rpo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D96598B-2DF4-45B6-BA4A-DC2F1293D22D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200v3rps_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B80F2202-875F-4AB2-9375-FDF1F259B0C0",
              "versionEndExcluding": "0006",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200v3rps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79F663FF-E715-45C3-8373-2C3E188F0C52",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1400fp2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "66BFCB62-1FFF-46F2-AE92-7085079E0A8E",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1400fp2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6A9F6CA-4C97-4378-982B-7610BF346149",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1400fp4_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FA1019D6-DCB5-4198-9D01-41022BB27816",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1400fp4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B874CCBA-109B-49FF-90A3-135B4C0256E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1400sp4_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1A2B620-F773-4DB1-A5AD-9B84CA3A9258",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1400sp4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09AF6EF0-EA59-4B11-B71F-D4AEAA7F3277",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1400sp2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A130A96F-9870-4219-ACFF-60A52ACE259D",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1400sp2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36796CC7-6322-40AA-9780-2B9196B5717B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1600jp2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C56679C2-4A11-4A4C-9906-25DA503B09F9",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1600jp2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1186293-BC27-442F-80B3-A878A198EA41",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1600jp4_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "54DCF03F-4F4D-4626-B151-7D3D6847C2E5",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1600jp4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "45E8B6F4-9562-4AF6-AC96-B0400B22A809",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2400bb4_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEF06DB8-8A71-4EC6-A68D-DB4BC76DD5C0",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2400bb4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B301A21-AAF6-4F7D-9349-ECB5C02C58A1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2400bb4_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEF06DB8-8A71-4EC6-A68D-DB4BC76DD5C0",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2400bb4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B301A21-AAF6-4F7D-9349-ECB5C02C58A1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2400ep2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1ABA467-E796-4C79-9971-9D62DEA49B3D",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2400ep2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "940ACFD3-A402-4B98-86BC-DEE0B4F0B6C8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2400ep4_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3DA1692-AD78-40D5-B2FA-C5C99BF8FCAA",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2400ep4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4E5F6751-9E4A-477F-8136-6BC2571F6F5F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2400sc2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "426544D2-7600-45B8-BDD8-A327A38A1A77",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2400sc2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD512FC0-6A9F-4844-ABBF-DAFEABF40476",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600co4_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "576BDD2E-AC10-4E29-BA8A-1DF3CF728336",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600co4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B18E49C6-91CC-4EE1-85EA-DC553C93D54D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600coe_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "411CAE1F-E79D-4F3A-A37D-FC28EEB13DD6",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600coe:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "933651A1-20C7-4F37-B52A-4A64E32334DA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600coeioc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C1C727B-ADE2-44F7-9E31-DA3D1536320C",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600coeioc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20924B8D-ACC4-483D-8C58-83046619C613",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cp2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "575438B6-9109-4510-A9A7-FFF67973415D",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600cp2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2DF14211-F444-4F68-9ED9-803E1815A898",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cp2ioc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B817DD8F-595B-47C9-A5F9-6804B89A5872",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600cp2ioc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B09B092-5A32-45F5-9017-2751D8330444",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cp2j_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B9984A3-2DFB-4BEF-9AAC-2001B83B18F6",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600cp2j:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EF8E32B-F660-4D1A-8B63-8CB4AA1DB791",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cp4_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC3ED1D6-24E1-4059-80B8-A03780208D37",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600cp4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4DB6A68F-F8C6-4C03-9E93-769E9E356139",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cp4ioc_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CBB888CC-BE42-4760-9462-25CB0E46EDF8",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600cp4ioc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33121A9B-E88A-417C-B582-13AF167221A3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600gl_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F7B37E5-EECB-4608-B50E-11D851DF869A",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600gl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8133CEB9-7E13-44B1-927E-2A0264088968",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600gz_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A725F25-C441-4F59-9309-1DFE23C576E4",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600gz:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47B9625C-206E-4B0E-8B8C-ABBA185E60AD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600ip4_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "78893F5F-01A9-4D8D-8695-74BEE436A55E",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600ip4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "842641ED-AAE6-48C9-817D-831AB91135BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600ip4l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "81EB0369-3AC8-454A-9973-8B7FA8CA9012",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600ip4l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F80FA61D-2E3B-458A-9C63-C89AADB54E58",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:workstation_board_w2600cr2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FDAA2D3-687E-4C0C-AD73-C6F7FFA3ED35",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:workstation_board_w2600cr2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6559004E-2637-4E5D-A506-D00CCA28FC73",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:workstation_board_w2600cr2l_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "14485650-4B12-4F38-81F2-658A2E8DD92F",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:workstation_board_w2600cr2l:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8398FD0B-364A-47F1-97E9-00A98B43D8F5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600jf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F9161A8-C926-408B-818F-0F63A631F91D",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600jf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0C796DC-3A63-4464-BA92-3CC2901B2A47",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B011A5D3-042A-4D97-B2C4-ED1FF3D962F3",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "36759E00-B1E9-49A1-89D3-E0A49F2BE921",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s4600lh2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5206C2F-065A-4934-9048-FC1A05B9BEC8",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s4600lh2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56E86431-7E8B-4C99-8A93-D0447EFDABCA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s4600lt2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "44161741-1A83-47B3-9F9C-B105B805380C",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s4600lt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "342DE5BF-CE73-412F-AB9D-46CD29C2A176",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wpf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C09E26E-3198-4F9A-9904-AAF0888E4498",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4427FF9F-E98A-43BC-A4BF-914AEF9886D9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wpq_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "773DDDE6-38B4-43BD-AA39-5B8E971AFF07",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27797133-337E-4E3B-95F6-4078276B80AA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600jff_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "354A1C3D-2FF1-47E0-9C23-6BA021EEDD3B",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600jff:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "24B062D8-8B68-4D53-B015-5AF034AE8DDF",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600jfq_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "53773575-4BE2-4DE5-B8C2-DA13ABB17411",
              "versionEndExcluding": "0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600jfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7C9F927-9DF9-4F61-BEDC-9A5824BAC736",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw2r_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E93CDE7-0A9A-4485-B965-32BE1B2C843D",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "02EB6A02-E78F-4359-9EC6-23C15F641894",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw2sr_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F9D235-ED84-4AC6-A2E2-5217649E267F",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "86C9F4EB-202E-4B16-AF95-FE26F3DEED4A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cwtr_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "63564BA1-EEFA-467D-A60F-89E337F2D007",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F98FC6C2-BC5D-4589-8365-84471A8CC2D9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cwtsr_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "694E995B-10FD-4DF6-8EC0-C598031808DA",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44CD2C62-21F8-442E-BB81-34AA75E78EF2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw2s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "97237DC5-FB7E-4630-AC88-D65E5AEBB99E",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41947773-E08F-441F-972D-C68510F73FD0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cwt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A86866F-621E-4E98-9B94-C30408BF2296",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AEC47B79-4866-443E-9E64-4262796E1CB5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cwts_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DC95D43F-83BB-43FF-BB10-9999E15A1894",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "74FBA655-5E53-4683-A24D-6A848C3F470D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "DAAD2DEB-3CF4-4076-9B72-2CEA15F8C4B7",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "30261DF9-3AB2-4FA2-82E5-C78A37E05831",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kpfr_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "29C351CD-E4B6-4EE9-94FE-B508C1DF31B0",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kpr_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "17028A5F-CC77-4CD9-A469-C2E307E4F9DB",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kptr_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "99A496A3-2AB9-45AD-9755-9EFB62383790",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "02B350B0-849E-429B-9506-C605E9B6329C",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kpf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "597E99C0-5C20-4C0C-BD01-41400C7B47D2",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600tpnr_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ADB50EB2-67BB-4F5F-8B4B-9C9A5DE39CB3",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D33FD84-CD1B-4CFE-8672-7DCFA5799953",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600tpfr_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6470986C-6E2C-49F9-A78F-46D89B81F54E",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600tpr_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "55D09BE2-2E64-4C2A-8416-401238D24DE0",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600tpf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B0A98218-0DC8-4426-ACF2-5C177BAC6815",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A238F52-941F-4D07-9E61-7C841B1C62F1",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wtts1r_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE3520AC-00F3-42E7-B06E-1A4BD782525F",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtts1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FE3E3E18-EF18-4361-B03F-3BBF6DE3B303",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt2r_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96A48D32-6855-4EDD-9B42-D200D7E73F53",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wttr_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E90A21E8-4DCA-4C4C-8224-D0BBEF560E46",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FC4BCCB-9B34-40CF-BED6-EC994F3F5F4E",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wtt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0179FD53-2E15-4554-97A2-B2C76BB6DBC0",
              "versionEndExcluding": "0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200btlrm_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F0D3A665-3486-451A-A5D9-607170C70FC5",
              "versionEndExcluding": "0044",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200btlrm:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5ED90E62-4FFD-45D7-A093-1F5D3110B3AE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200btlr_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3586661-E23A-4B69-9B62-59049EF202FB",
              "versionEndExcluding": "0044",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200btlr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "42945F35-B5CB-4350-8EE6-6F4C43B9818C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200btsr_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "658BF41B-2AF1-4345-989F-D3DEC0B429BC",
              "versionEndExcluding": "0044",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200btsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFB2B5F5-9B75-4DEA-AD72-3190CAE85271",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200btl_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4BEFBEC-C678-4BA7-B00F-48DC5824FBED",
              "versionEndExcluding": "0044",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200btl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E55B4A0D-4539-452D-BE98-A5338F87E441",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200bts_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5356A742-A651-4C66-A073-824C94B7DAAE",
              "versionEndExcluding": "0044",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200bts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B3FF88AB-0F8B-4F6C-8510-10A985187AC5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control in the Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family with the BIOS version 0016 may allow a privileged user to potentially enable escalation of privilege via local access."
    }
  ],
  "id": "CVE-2023-30768",
  "lastModified": "2024-11-21T08:00:51.883",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.7,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.1,
        "impactScore": 6.0,
        "source": "secure@intel.com",
        "type": "Secondary"
      },
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2023-05-12T15:15:09.420",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Mitigation",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-284"
        }
      ],
      "source": "secure@intel.com",
      "type": "Secondary"
    },
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una autenticaci\u00f3n inapropiada para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-8708",
  "lastModified": "2024-11-21T05:39:18.270",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.103",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Improper input validation for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8721",
  "lastModified": "2024-11-21T05:39:20.000",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.867",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Heap-based buffer overflow in the firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in the firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en la regi\u00f3n heap de la memoria en el firmware para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-8732",
  "lastModified": "2024-11-21T05:39:20.843",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:16.290",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Buffer overflow in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F430AA-ECCD-4991-9178-FB7A970B800C",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2F0E72B-986D-47C2-8A91-9071C8D374D9",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E7ADD13-9BDA-441B-8034-DFC7D916A5CF",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D756005-D507-48D2-8032-D6CA8B404BE7",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A1051E-2A0B-4EBB-A8B5-C12673CE3809",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E443F234-9F18-42F6-854D-3F5A041E5AA3",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "00A36EA5-DBF1-46D7-A6E8-01F3C971E791",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F14DD88-F7DD-49C6-A02E-270BA3D6C368",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CDA2F1B-4157-4B9F-94A4-42ADD662E667",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34B1B9B2-57E1-4A6C-B5B8-F37EA7B8A792",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "812D54CF-2239-4DC6-9E5C-A8A9A8137484",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04498E65-4040-4C6A-A3D3-645B1291EF27",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C2B835-62E5-4234-A537-23C06363C99C",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0EE3C5-D366-4328-8219-859AED3DB889",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF6A2EC-A08E-4BA1-B935-E105CBACC0AD",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B07FAEA5-01FB-4F72-BBE0-901878476506",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "417A4480-1225-4264-B69E-33A89BBA4CFA",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CD6EE2-3897-4176-B3B0-B810D0C4A717",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en el cargador de arranque para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules  versiones anteriores a  2.45, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8710",
  "lastModified": "2024-11-21T05:39:18.517",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.243",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2020-8730
Vulnerability from cvelistv5
Published
2020-08-13 02:24
Modified
2024-08-04 10:12
Severity ?
Summary
Heap-based overflow for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.532Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based overflow for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:17",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8730",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based overflow for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8730",
    "datePublished": "2020-08-13T02:24:32",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.532Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8706
Vulnerability from cvelistv5
Published
2020-08-13 02:55
Modified
2024-08-04 10:03
Severity ?
Summary
Buffer overflow in a daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.508Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in a daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:16",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8706",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in a daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8706",
    "datePublished": "2020-08-13T02:55:38",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.508Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8718
Vulnerability from cvelistv5
Published
2020-08-13 02:43
Modified
2024-08-04 10:12
Severity ?
Summary
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.520Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:19",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8718",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8718",
    "datePublished": "2020-08-13T02:43:18",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.520Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8713
Vulnerability from cvelistv5
Published
2020-08-13 02:53
Modified
2024-08-04 10:03
Severity ?
Summary
Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.372Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:16",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8713",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8713",
    "datePublished": "2020-08-13T02:53:56",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.372Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8714
Vulnerability from cvelistv5
Published
2020-08-13 03:00
Modified
2024-08-04 10:03
Severity ?
Summary
Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.333Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:14",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8714",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8714",
    "datePublished": "2020-08-13T03:00:02",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.333Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8729
Vulnerability from cvelistv5
Published
2020-08-13 02:56
Modified
2024-08-04 10:12
Severity ?
Summary
Buffer copy without checking size of input for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.571Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer copy without checking size of input for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:09",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8729",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer copy without checking size of input for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8729",
    "datePublished": "2020-08-13T02:56:11",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.571Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8711
Vulnerability from cvelistv5
Published
2020-08-13 02:42
Modified
2024-08-04 10:03
Severity ?
Summary
Improper access control in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.440Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 2.45"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:22",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8711",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 2.45"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper access control in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8711",
    "datePublished": "2020-08-13T02:42:10",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.440Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8716
Vulnerability from cvelistv5
Published
2020-08-13 02:59
Modified
2024-08-04 10:03
Severity ?
Summary
Improper access control for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.291Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:10",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8716",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper access control for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8716",
    "datePublished": "2020-08-13T02:59:24",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.291Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8709
Vulnerability from cvelistv5
Published
2020-08-13 02:52
Modified
2024-08-04 10:03
Severity ?
Summary
Improper authentication in socket services for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.375Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 2.45"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper authentication in socket services for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:13",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8709",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 2.45"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper authentication in socket services for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8709",
    "datePublished": "2020-08-13T02:52:30",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.375Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8708
Vulnerability from cvelistv5
Published
2020-08-13 02:23
Modified
2024-08-04 10:03
Severity ?
Summary
Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.365Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:10",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8708",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8708",
    "datePublished": "2020-08-13T02:23:36",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.365Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8707
Vulnerability from cvelistv5
Published
2020-08-13 02:27
Modified
2024-08-04 10:03
Severity ?
Summary
Buffer overflow in daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.267Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:12",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8707",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8707",
    "datePublished": "2020-08-13T02:27:58",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.267Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8719
Vulnerability from cvelistv5
Published
2020-08-13 02:29
Modified
2024-08-04 10:12
Severity ?
Summary
Buffer overflow in subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.465Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:21",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8719",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8719",
    "datePublished": "2020-08-13T02:29:56",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.465Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8721
Vulnerability from cvelistv5
Published
2020-08-13 02:30
Modified
2024-08-04 10:12
Severity ?
Summary
Improper input validation for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.572Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:14",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8721",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8721",
    "datePublished": "2020-08-13T02:30:43",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.572Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8720
Vulnerability from cvelistv5
Published
2020-08-13 03:11
Modified
2024-08-04 10:12
Severity ?
Summary
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.519Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:11",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8720",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8720",
    "datePublished": "2020-08-13T03:11:24",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.519Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8717
Vulnerability from cvelistv5
Published
2020-08-13 03:00
Modified
2024-08-04 10:12
Severity ?
Summary
Improper input validation in a subsystem for some Intel Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.231Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in a subsystem for some Intel Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:15",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8717",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation in a subsystem for some Intel Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8717",
    "datePublished": "2020-08-13T03:00:44",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.231Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8715
Vulnerability from cvelistv5
Published
2020-08-13 02:57
Modified
2024-08-04 10:03
Severity ?
Summary
Invalid pointer for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.387Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Invalid pointer for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:12",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8715",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Invalid pointer for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8715",
    "datePublished": "2020-08-13T02:57:13",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.387Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8710
Vulnerability from cvelistv5
Published
2020-08-13 02:31
Modified
2024-08-04 10:03
Severity ?
Summary
Buffer overflow in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.275Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 2.45"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:22",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8710",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 2.45"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8710",
    "datePublished": "2020-08-13T02:31:24",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.275Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8732
Vulnerability from cvelistv5
Published
2020-08-13 02:52
Modified
2024-08-04 10:12
Severity ?
Summary
Heap-based buffer overflow in the firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.230Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in the firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:23",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8732",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in the firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8732",
    "datePublished": "2020-08-13T02:52:04",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.230Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8731
Vulnerability from cvelistv5
Published
2020-08-13 02:26
Modified
2024-08-04 10:12
Severity ?
Summary
Incorrect execution-assigned permissions in the file system for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.512Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Incorrect execution-assigned permissions in the file system for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:19",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8731",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Incorrect execution-assigned permissions in the file system for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8731",
    "datePublished": "2020-08-13T02:26:24",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.512Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-30768
Vulnerability from cvelistv5
Published
2023-05-12 14:01
Modified
2024-08-02 14:37
Summary
Improper access control in the Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family with the BIOS version 0016 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T14:37:15.115Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html",
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "BIOS version 0016"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control in the Intel(R) Server Board S2600WTT belonging to the Intel(R) Server Board S2600WT Family with the BIOS version 0016 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "CHANGED",
            "userInteraction": "REQUIRED",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en"
            },
            {
              "cweId": "CWE-284",
              "description": "Improper access control",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-05-12T14:01:48.723Z",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html",
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00056.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2023-30768",
    "datePublished": "2023-05-12T14:01:48.723Z",
    "dateReserved": "2023-04-25T03:00:03.893Z",
    "dateUpdated": "2024-08-02T14:37:15.115Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8723
Vulnerability from cvelistv5
Published
2020-08-13 02:53
Modified
2024-08-04 10:12
Severity ?
Summary
Cross-site scripting for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.630Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:18",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8723",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8723",
    "datePublished": "2020-08-13T02:53:26",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.630Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8722
Vulnerability from cvelistv5
Published
2020-08-13 02:51
Modified
2024-08-04 10:12
Severity ?
Summary
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.218Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:17",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8722",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8722",
    "datePublished": "2020-08-13T02:51:27",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.218Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8712
Vulnerability from cvelistv5
Published
2020-08-13 02:42
Modified
2024-08-04 10:03
Severity ?
Summary
Buffer overflow in a verification process for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.478Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 2.45"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in a verification process for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:20",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8712",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 2.45"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in a verification process for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8712",
    "datePublished": "2020-08-13T02:42:49",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.478Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}