All the vulnerabilites related to intel - server_system_r1304wf0ysr
Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Buffer overflow in a verification process for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F430AA-ECCD-4991-9178-FB7A970B800C",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2F0E72B-986D-47C2-8A91-9071C8D374D9",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E7ADD13-9BDA-441B-8034-DFC7D916A5CF",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D756005-D507-48D2-8032-D6CA8B404BE7",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A1051E-2A0B-4EBB-A8B5-C12673CE3809",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E443F234-9F18-42F6-854D-3F5A041E5AA3",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "00A36EA5-DBF1-46D7-A6E8-01F3C971E791",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F14DD88-F7DD-49C6-A02E-270BA3D6C368",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CDA2F1B-4157-4B9F-94A4-42ADD662E667",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34B1B9B2-57E1-4A6C-B5B8-F37EA7B8A792",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "812D54CF-2239-4DC6-9E5C-A8A9A8137484",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04498E65-4040-4C6A-A3D3-645B1291EF27",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C2B835-62E5-4234-A537-23C06363C99C",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0EE3C5-D366-4328-8219-859AED3DB889",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF6A2EC-A08E-4BA1-B935-E105CBACC0AD",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B07FAEA5-01FB-4F72-BBE0-901878476506",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "417A4480-1225-4264-B69E-33A89BBA4CFA",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CD6EE2-3897-4176-B3B0-B810D0C4A717",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in a verification process for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en un proceso de verificaci\u00f3n para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a  2.45, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8712",
  "lastModified": "2024-11-21T05:39:18.763",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.367",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en un subsistema para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8718",
  "lastModified": "2024-11-21T05:39:19.537",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.727",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Invalid pointer for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Invalid pointer for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Un puntero no v\u00e1lido para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario no autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8715",
  "lastModified": "2024-11-21T05:39:19.137",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.557",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-763"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Improper access control for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inapropiado para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8716",
  "lastModified": "2024-11-21T05:39:19.260",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.603",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-06-09 20:15
Modified
2024-11-21 05:14
Summary
Out of bounds write in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel baseboard_management_controller_firmware *
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C278DDFA-5747-405C-ACBD-410AE6AC9793",
              "versionEndExcluding": "2.48.ce3e3bd2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Out of bounds write in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Una escritura fuera de l\u00edmites en el firmware del BMC para algunas Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 2.48.ce3e3bd2, puede permitir a un usuario autenticado permitir potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-24473",
  "lastModified": "2024-11-21T05:14:52.447",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-09T20:15:08.050",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 04:15
Modified
2024-11-21 05:39
Summary
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en un subsistema para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario con privilegios habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8720",
  "lastModified": "2024-11-21T05:39:19.843",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T04:15:14.240",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Buffer overflow in subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en un subsistema para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8719",
  "lastModified": "2024-11-21T05:39:19.690",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.807",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Cross-site scripting for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Cross-site scripting for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de tipo cross-site scripting para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-8723",
  "lastModified": "2024-11-21T05:39:20.283",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.4,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 5.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "LOW",
          "baseScore": 6.3,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "CHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L",
          "version": "3.1"
        },
        "exploitabilityScore": 2.1,
        "impactScore": 3.7,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:16.007",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-79"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-06-09 20:15
Modified
2024-11-21 05:14
Summary
Improper initialization in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel baseboard_management_controller_firmware *
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C278DDFA-5747-405C-ACBD-410AE6AC9793",
              "versionEndExcluding": "2.48.ce3e3bd2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper initialization in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Una inicializaci\u00f3n incorrecta en el firmware del BMC Intel\u00ae Server Boards, Server Systems and Compute Modules versiones anteriores a 2.48.ce3e3bd2, puede permitir a un usuario autenticado permitir potencialmente una denegaci\u00f3n de servicio por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-24475",
  "lastModified": "2024-11-21T05:14:52.723",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-09T20:15:08.110",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-665"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Improper authentication in socket services for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F430AA-ECCD-4991-9178-FB7A970B800C",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2F0E72B-986D-47C2-8A91-9071C8D374D9",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E7ADD13-9BDA-441B-8034-DFC7D916A5CF",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D756005-D507-48D2-8032-D6CA8B404BE7",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A1051E-2A0B-4EBB-A8B5-C12673CE3809",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E443F234-9F18-42F6-854D-3F5A041E5AA3",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "00A36EA5-DBF1-46D7-A6E8-01F3C971E791",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F14DD88-F7DD-49C6-A02E-270BA3D6C368",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CDA2F1B-4157-4B9F-94A4-42ADD662E667",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34B1B9B2-57E1-4A6C-B5B8-F37EA7B8A792",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "812D54CF-2239-4DC6-9E5C-A8A9A8137484",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04498E65-4040-4C6A-A3D3-645B1291EF27",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C2B835-62E5-4234-A537-23C06363C99C",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0EE3C5-D366-4328-8219-859AED3DB889",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF6A2EC-A08E-4BA1-B935-E105CBACC0AD",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B07FAEA5-01FB-4F72-BBE0-901878476506",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "417A4480-1225-4264-B69E-33A89BBA4CFA",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CD6EE2-3897-4176-B3B0-B810D0C4A717",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper authentication in socket services for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una autenticaci\u00f3n inapropiada en los servicios de socket para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 2.45, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-8709",
  "lastModified": "2024-11-21T05:39:18.393",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.180",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Buffer copy without checking size of input for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer copy without checking size of input for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "La copia del b\u00fafer sin comprobar el tama\u00f1o de entrada para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8729",
  "lastModified": "2024-11-21T05:39:20.460",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:16.070",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en un subsistema para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8722",
  "lastModified": "2024-11-21T05:39:20.157",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.947",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2021-06-09 20:15
Modified
2024-11-21 05:14
Summary
Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
intel baseboard_management_controller_firmware *
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C278DDFA-5747-405C-ACBD-410AE6AC9793",
              "versionEndExcluding": "2.48.ce3e3bd2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via adjacent access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en el firmware del BMC para algunas Intel\u00ae Server Boards, Server Systems and Compute Modules versiones anteriores a la versi\u00f3n 2.48.ce3e3bd2 puede permitir a un usuario autenticado permitir potencialmente una escalada de privilegios por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-24474",
  "lastModified": "2024-11-21T05:14:52.593",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "SINGLE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.2,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 5.1,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.0,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.1,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-06-09T20:15:08.087",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Buffer overflow in daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en un demonio para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-8707",
  "lastModified": "2024-11-21T05:39:18.150",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.040",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Una autenticaci\u00f3n inapropiada para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8714",
  "lastModified": "2024-11-21T05:39:19.010",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.493",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Heap-based overflow for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based overflow for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento en la regi\u00f3n heap de la memoria para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59 puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8730",
  "lastModified": "2024-11-21T05:39:20.580",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:16.150",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Incorrect execution-assigned permissions in the file system for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Incorrect execution-assigned permissions in the file system for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Unos permisos asignados en una ejecuci\u00f3n incorrecta en el sistema de archivos para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, pueden permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8731",
  "lastModified": "2024-11-21T05:39:20.710",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:16.210",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una autenticaci\u00f3n inapropiada para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-8713",
  "lastModified": "2024-11-21T05:39:18.893",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.430",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Improper access control in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F430AA-ECCD-4991-9178-FB7A970B800C",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2F0E72B-986D-47C2-8A91-9071C8D374D9",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E7ADD13-9BDA-441B-8034-DFC7D916A5CF",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D756005-D507-48D2-8032-D6CA8B404BE7",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A1051E-2A0B-4EBB-A8B5-C12673CE3809",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E443F234-9F18-42F6-854D-3F5A041E5AA3",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "00A36EA5-DBF1-46D7-A6E8-01F3C971E791",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F14DD88-F7DD-49C6-A02E-270BA3D6C368",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CDA2F1B-4157-4B9F-94A4-42ADD662E667",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34B1B9B2-57E1-4A6C-B5B8-F37EA7B8A792",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "812D54CF-2239-4DC6-9E5C-A8A9A8137484",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04498E65-4040-4C6A-A3D3-645B1291EF27",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C2B835-62E5-4234-A537-23C06363C99C",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0EE3C5-D366-4328-8219-859AED3DB889",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF6A2EC-A08E-4BA1-B935-E105CBACC0AD",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B07FAEA5-01FB-4F72-BBE0-901878476506",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "417A4480-1225-4264-B69E-33A89BBA4CFA",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CD6EE2-3897-4176-B3B0-B810D0C4A717",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper access control in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un control de acceso inapropiado en el cargador de arranque para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules  versiones anteriores a  2.45, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8711",
  "lastModified": "2024-11-21T05:39:18.640",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.290",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Buffer overflow in a daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in a daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en un demonio para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-8706",
  "lastModified": "2024-11-21T05:39:18.010",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:14.977",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Improper input validation in a subsystem for some Intel Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation in a subsystem for some Intel Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada en un subsistema para algunos Intel Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario autenticado habilitar potencialmente una denegaci\u00f3n de servicio por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8717",
  "lastModified": "2024-11-21T05:39:19.387",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 2.1,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 5.5,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.663",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
    },
    {
      "lang": "es",
      "value": "Una autenticaci\u00f3n inapropiada para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-8708",
  "lastModified": "2024-11-21T05:39:18.270",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.103",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-287"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Improper input validation for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Improper input validation for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Una comprobaci\u00f3n de entrada inapropiada para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8721",
  "lastModified": "2024-11-21T05:39:20.000",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.2,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.5,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.867",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Heap-based buffer overflow in the firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C380DD29-24F1-44E7-B75A-E1D9002724FB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7568EE4A-061B-4D18-B2B5-C00A585D66A8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EBAAA11-8277-44EA-A457-C89C13E9FBD8",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "36F0F130-0B43-4D46-9983-13F660A0A6F5",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "092BCE82-58D4-48C7-B53A-9479553F8908",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "42C6A66E-EA5D-4959-B21A-319C19C42C4A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C921A44-9D4B-4B12-9E97-AF3EC453B80A",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4924F15-3EE6-4C34-AD7F-C6AB3EC837F3",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "91A02958-ECC0-4402-99F4-24FD89171504",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44F2005-AF7B-4140-A41F-79D7F2CF18CB",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5526102-99E5-47EF-972C-3B5114D32C31",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E71D4B8-51E7-4BE6-A5E2-7FFA270ECDAD",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73171C4-9292-4EAA-A5AE-45AB8017037E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B6B289A-0136-44E8-BD7B-58D9BA07023B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9748B13-BCD2-4B0D-BCEC-0251CF6B1C4E",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "85A97A56-9E79-4811-B90C-EF59115E1C84",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "13352C01-C0C0-4747-9F76-E431A24B554B",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "600B7CE5-3027-40E9-B833-049104C65714",
              "versionEndExcluding": "1.59",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Heap-based buffer overflow in the firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en la regi\u00f3n heap de la memoria en el firmware para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules versiones anteriores a 1.59, puede permitir a un usuario no autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso adyacente"
    }
  ],
  "id": "CVE-2020-8732",
  "lastModified": "2024-11-21T05:39:20.843",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "ADJACENT_NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:A/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 6.5,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "ADJACENT_NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:16.290",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2020-08-13 03:15
Modified
2024-11-21 05:39
Summary
Buffer overflow in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel server_board_s2600wt_firmware *
intel server_board_s2600wt2 -
intel server_board_s2600wt2r -
intel server_board_s2600wtt -
intel server_board_s2600wttr -
intel server_system_r1000wt_firmware *
intel server_system_r1208wt2gs -
intel server_system_r1208wt2gsr -
intel server_system_r1208wttgs -
intel server_system_r1208wttgsbpp -
intel server_system_r1208wttgsr -
intel server_system_r1304wt2gs -
intel server_system_r1304wt2gsr -
intel server_system_r1304wttgs -
intel server_system_r1304wttgsr -
intel server_system_r2000wt_firmware *
intel server_system_r2208wt2ys -
intel server_system_r2208wt2ysr -
intel server_system_r2208wttyc1 -
intel server_system_r2208wttyc1r -
intel server_system_r2208wttys -
intel server_system_r2208wttysr -
intel server_system_r2224wttys -
intel server_system_r2224wttysr -
intel server_system_r2308wttys -
intel server_system_r2308wttysr -
intel server_system_r2312wttys -
intel server_system_r2312wttysr -
intel server_board_s2600cw *
intel server_board_s2600cw2 -
intel server_board_s2600cw2r -
intel server_board_s2600cw2s -
intel server_board_s2600cw2sr -
intel server_board_s2600cwt -
intel server_board_s2600cwtr -
intel server_board_s2600cwts -
intel server_board_s2600cwtsr -
intel compute_module_hns2600kp_firmware *
intel compute_module_hns2600kp -
intel compute_module_hns2600kpf -
intel compute_module_hns2600kpfr -
intel compute_module_hns2600kpr -
intel server_board_s2600kp_firmware *
intel server_board_s2600kp -
intel server_board_s2600kpf -
intel server_board_s2600kpfr -
intel server_board_s2600kpr -
intel server_board_s2600kptr -
intel compute_module_hns2600tp_firmware *
intel compute_module_hns2600tp -
intel compute_module_hns2600tp24r -
intel compute_module_hns2600tp24sr -
intel compute_module_hns2600tpf -
intel compute_module_hns2600tpfr -
intel compute_module_hns2600tpr -
intel compute_module_s2600tp_firmware *
intel server_board_s2600tp -
intel server_board_s2600tpf -
intel server_board_s2600tpfr -
intel server_board_s2600tpr -
intel server_board_s1200sp_firmware *
intel server_board_s1200spl -
intel server_board_s1200splr -
intel server_board_s1200spo -
intel server_board_s1200spor -
intel server_board_s1200sps -
intel server_board_s1200spsr -
intel server_system_lr1304sp_firmware *
intel server_system_lr1304spcfg1 -
intel server_system_lr1304spcfg1r -
intel server_system_lr1304spcfsgx1 -
intel server_system_lsvrp_firmware *
intel server_system_lsvrp4304es6xx1 -
intel server_system_lsvrp4304es6xxr -
intel server_system_r1000sp_firmware *
intel server_system_r1208sposhor -
intel server_system_r1208sposhorr -
intel server_system_r1304sposhbn -
intel server_system_r1304sposhbnr -
intel server_system_r1304sposhor -
intel server_system_r1304sposhorr -
intel server_board_s2600wf_firmware *
intel server_board_s2600wf0 -
intel server_board_s2600wf0r -
intel server_board_s2600wfq -
intel server_board_s2600wfqr -
intel server_board_s2600wft -
intel server_board_s2600wftr -
intel server_system_r1000wf_firmware *
intel server_system_lnetcnt3y -
intel server_system_mcb2208wfaf4 -
intel server_system_mcb2208wfaf5 -
intel server_system_mcb2208wfaf6 -
intel server_system_mcb2208wfhy2 -
intel server_system_nb2208wfqnfvi -
intel server_system_r1208wfqysr -
intel server_system_r1208wftys -
intel server_system_r1208wftysr -
intel server_system_r1304wf0ys -
intel server_system_r1304wf0ysr -
intel server_system_r1304wftys -
intel server_system_r1304wftysr -
intel server_system_r2000wf_firmware *
intel server_system_r2208wf0zs -
intel server_system_r2208wf0zsr -
intel server_system_r2208wfqzs -
intel server_system_r2208wfqzsr -
intel server_system_r2208wftzs -
intel server_system_r2208wftzsr -
intel server_system_r2224wfqzs -
intel server_system_r2224wftzs -
intel server_system_r2224wftzsr -
intel server_system_r2308wftzs -
intel server_system_r2308wftzsr -
intel server_system_r2312wf0np -
intel server_system_r2312wf0npr -
intel server_system_r2312wfqzs -
intel server_system_r2312wftzs -
intel server_system_r2312wftzsr -
intel server_system_vrn2208waf6 -
intel server_system_vrn2208wfaf81 -
intel server_system_vrn2208wfaf82 -
intel server_system_vrn2208wfaf83 -
intel server_system_vrn2208wfhy6 -
intel server_board_s2600st_firmware *
intel server_board_s2600stb -
intel server_board_s2600stbr -
intel server_board_s2600stq -
intel server_board_s2600stqr -
intel compute_module_hns2600bp_firmware *
intel compute_module_hns2600bpb -
intel compute_module_hns2600bpb24 -
intel compute_module_hns2600bpb24r -
intel compute_module_hns2600bpblc -
intel compute_module_hns2600bpblc24 -
intel compute_module_hns2600bpblc24r -
intel compute_module_hns2600bpblcr -
intel compute_module_hns2600bpbr -
intel compute_module_hns2600bpq -
intel compute_module_hns2600bpq24 -
intel compute_module_hns2600bpq24r -
intel compute_module_hns2600bpqr -
intel compute_module_hns2600bps -
intel compute_module_hns2600bps24 -
intel compute_module_hns2600bps24r -
intel compute_module_hns2600bpsr -
intel server_board_s2600bp_firmware *
intel server_board_s2600bpb -
intel server_board_s2600bpbr -
intel server_board_s2600bpq -
intel server_board_s2600bpqr -
intel server_board_s2600bps -
intel server_board_s2600bpsr -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "76F430AA-ECCD-4991-9178-FB7A970B800C",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B46BEF2-6DDD-4474-9EE3-1048B34799E2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wt2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "41E65AA4-9C4E-4266-B810-925FB606E9B8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wtt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5477F4F2-9407-4482-9700-66B65C1FB61D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wttr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A129FC6-C1B2-4E28-B0DF-BE74F61C43E2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2F0E72B-986D-47C2-8A91-9071C8D374D9",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4A4588E-5876-482B-A2C7-EFCDD7EF59FB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFAEFB58-7574-49E5-8257-7F2FC10240F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DF0C266A-C67C-4D92-BEF3-7C41A864A794",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsbpp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D73E623C-D8DC-40C0-A99B-AB4CF6C0D6F2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "69C4E681-1D58-418E-8E1D-B48CE38B8928",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E9F4E8FC-660E-45BB-80D9-6FC0BBBC5C0B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wt2gsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "094931E4-9521-415B-A7DE-FE925F00D661",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8D68741B-4BFE-4CCB-8B56-B5D37990C4D1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wttgsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "33BCB673-5F10-4AF7-B4E9-0B61B9A990E1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wt_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0E7ADD13-9BDA-441B-8034-DFC7D916A5CF",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "432C56C5-D914-4F44-A655-07E793E172CD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wt2ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B3887D8-8A1B-4047-AB50-4E1283CAB80C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "772D2166-1A45-427D-8907-4112FA391913",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttyc1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4AF70339-212A-4D03-B93B-F2E56451681A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2AAC60DA-8CE9-4541-A256-84F07B22C591",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A61C9826-7390-49E5-B7CE-A325A2B9DD85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2BA77C-24E5-409F-A342-369175CBBA69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D9716B3-EAF4-4AC8-B1E9-2289F37687C5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66EB3B21-6145-4896-8D8C-67369083B84F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39E579A1-0693-48D3-9E0E-897D4F4A10A3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8E18BB67-BC8F-42DC-AB26-FA4992D6314C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wttysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7628D5F-0CEA-4B15-8399-35CB2AB73EC0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600cw:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D756005-D507-48D2-8032-D6CA8B404BE7",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4282496-09DE-48B6-B4D9-753C09C6D66E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E87CC782-4757-4221-BD90-508F9E6E529D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3484F942-7E24-4F61-9E0B-4D8A574CE217",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cw2sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCB5D87F-7306-430F-AD73-0D733E1FD352",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwt:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B95B36B6-ECE7-4869-A603-A7F3AD6EEC36",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E536169-8779-4BDF-8322-67125B0569DC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwts:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "290A87C1-CC53-44C1-AA65-85BE99638E00",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:a:intel:server_board_s2600cwtsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6D3FB78-BFF0-466E-8838-A3631BE73C20",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "92A1051E-2A0B-4EBB-A8B5-C12673CE3809",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5DD55B38-EE6F-495B-BF94-7FB79A1D2A98",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "995A0ED2-B4C1-4EA8-9141-E7EF9C686FB8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9EAC16D8-B7CA-44A8-9AC6-9356C295E256",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C09E79BA-FDE1-487E-9B2B-B5510319A1E9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600kp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E443F234-9F18-42F6-854D-3F5A041E5AA3",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "386FA2E6-E379-45D1-8B68-4F5D3D96C2F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C26DE3C0-4C85-4208-8897-0A3C6E9DEEA2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D050F325-C411-41D9-B497-6E66E474889D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "97AEEB8B-C89E-498A-9094-C85F22006FB5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600kptr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6FD6055-AC53-4327-A3D6-FD5CF0B1C46C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "00A36EA5-DBF1-46D7-A6E8-01F3C971E791",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "79B2E584-A52B-43B7-8ED5-499E2D34DBD5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CF342AE-EDC9-4708-8616-05892361FFDA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tp24sr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "46A9683C-C281-40A6-8277-DF5201EC4B94",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "49276B73-6675-489D-82F9-5992F2327BF7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89DBF47C-9D00-4ED6-AFCC-3E1DC6E4D5B1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D229F15A-6E3B-436C-83CE-57B9E53FCA25",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_s2600tp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7F14DD88-F7DD-49C6-A02E-270BA3D6C368",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB34A782-A932-480F-BE46-1B766AD7C3F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpf:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "18E66D8C-046E-416A-AE76-2AC22AB7A0BC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpfr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C95562AD-433D-42DA-97B5-CA490E4763BE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600tpr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "197E928E-D2B5-4BB0-8154-C01F938A2531",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s1200sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CDA2F1B-4157-4B9F-94A4-42ADD662E667",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spl:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D36820BD-B76E-4826-BDAB-22293F0DC988",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200splr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E579DD87-3098-4B61-A7C2-71653DE55715",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spo:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "65B6B8E8-205E-46DF-95C6-99533727BC97",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7D92D9CE-79AB-4458-AFC9-0DF7474F0FDB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200sps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F33CB4EC-229A-4E56-B840-5CD1DF25D2B6",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s1200spsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB1D61-909F-4C8A-B748-C94588A4DEE5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lr1304sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "34B1B9B2-57E1-4A6C-B5B8-F37EA7B8A792",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8251BC6C-7435-4698-B77B-86AF5134A998",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfg1r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FBA2A4-208E-47D3-920E-BA3595240311",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lr1304spcfsgx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "471F40BB-92B8-4DA6-98E7-A7C411229A8E",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_lsvrp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "812D54CF-2239-4DC6-9E5C-A8A9A8137484",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xx1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFAC3DB8-427B-4353-A216-6F84E905B2FE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_lsvrp4304es6xxr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78ADE268-C274-4BCE-A61F-26977A9C62A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000sp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "04498E65-4040-4C6A-A3D3-645B1291EF27",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "685D4F82-3839-48E7-85C5-02FD40625798",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27658DEA-645B-408F-A673-7F3BC60E0D85",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbn:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A0077F-EF1D-441F-99FA-D3D3ACBA43BB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhbnr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B02B2B6-C476-450A-89A8-DDFF98F3E1DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhor:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0FCBA51-6710-40A7-9A5D-D5C05D7ED379",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304sposhorr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9AF62B99-4404-4344-847B-AADC95B59C3C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D0C2B835-62E5-4234-A537-23C06363C99C",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9CCCE537-4860-4225-BB53-338B7345FDC2",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wf0r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "625A36EB-4866-4272-A886-7271B849C86B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A13732C9-E6D3-4415-ABBF-1DF5ED372AC8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wfqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DECC4837-716C-415A-B1A2-09B727081CE5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wft:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B373425D-4369-46A8-BFEE-B60612CB2755",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600wftr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "167759CD-6F60-46AF-BE30-CAD113C482A8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r1000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D0EE3C5-D366-4328-8219-859AED3DB889",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_lnetcnt3y:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E3B3A8FF-3AC3-40CF-9CC2-CDF3DB04E2F0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf4:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "78BBA63F-7D27-4E80-982E-88736992B8D3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf5:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF79097A-8552-4D5A-884A-3D63EFC8E621",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfaf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8AD1897E-3145-4457-B0C0-58A574890FC5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_mcb2208wfhy2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "16CEB940-A9B9-4957-9118-1C2BE92F47F7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_nb2208wfqnfvi:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF485CB5-E090-4441-8D24-EE78A3D7DA3E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wfqysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "834CDB1A-D6B0-448C-B042-423D34A2F4EF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8757A5AE-61C8-48A6-A54E-9C8DE425584C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1208wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5C90C22-4E86-420F-A062-C4ACA49DC1C9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFEA33CD-9910-402C-90EB-A922950E94CF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wf0ysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "87AF3933-2736-4F3F-A064-E92964321D4F",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftys:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF019AB7-0345-4562-BEF8-D2DB446514B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r1304wftysr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9899FE0-BCF1-4CF2-9851-4E711953B583",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_system_r2000wf_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6EF6A2EC-A08E-4BA1-B935-E105CBACC0AD",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7DFF4A60-F4F7-4360-AF28-D792FBA3C017",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wf0zsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DC77A0B-3B2C-4FE5-842B-F479A4D29BE9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "005DF7CE-D7F8-4607-86E0-79DE04920E1E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wfqzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AC58518E-3BA2-4857-8F48-2C4BDD7FA0E1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B7EFE347-AC80-40C6-972E-0C0C53431844",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2208wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C92D49CF-66BA-4067-A97C-5C65277D015A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3155205F-03CB-44D4-954B-108B3E159F67",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE01726B-70C4-472E-A042-1C28AA087ECB",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2224wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "67D02251-2DEE-4AF6-BA12-2EB2DF9F4129",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "108399C1-CF18-43CB-841E-DD07EB0793B0",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2308wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "09F6A510-B33D-4AC1-A9EC-71D3A5335531",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0np:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "477B1048-9672-4702-B62B-D494AF3D76D5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wf0npr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0473BCDE-85FE-419B-A866-711456D7BC18",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wfqzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CB82A2C-13F7-44B4-A34D-6E4F25974F5C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzs:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "00C76F81-BAFA-44DE-8FB5-FC65037B26DE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_r2312wftzsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDAC3377-2300-4DED-A948-E026643DA14E",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208waf6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64E1BB07-CC45-4DF5-B475-95CF7C6B597A",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf81:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "723C7F3C-F644-4ACA-B8D2-7404D909246D",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf82:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9FD684B-5B55-42C1-AB30-E69B9A429CE8",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfaf83:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0AAA1D57-1635-4498-9427-0577BE394F99",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_system_vrn2208wfhy6:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E8BF95E2-A68C-41AE-BDEC-DBEAB4EEAB62",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600st_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B07FAEA5-01FB-4F72-BBE0-901878476506",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F140D92-17D3-47BB-AF30-CBF219450E4B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AED55C57-4279-4453-8C8F-33F45CA4C5E7",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "54E28FB7-CD61-4281-8CBC-6BA488C3465C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600stqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "340FD4CA-6B38-406F-A219-4D6D33816327",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:compute_module_hns2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "417A4480-1225-4264-B69E-33A89BBA4CFA",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "840C1EB2-1733-4B30-9BFD-18C6DE4278F3",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DDE416FA-6492-4B6D-90F5-E070492A8B5B",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpb24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBAE24DF-2226-459C-9BCE-8A062577D6D9",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "32262A66-91B4-4F3A-9C6C-720746C4E5E5",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6F39C203-2002-42FD-92CB-E10F191A23FA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblc24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA6AD771-8195-4725-83D0-AAAAA3CF1A53",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpblcr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1797A5C-10D0-4874-800B-E2E11E87BEEF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "345D9886-97FD-497C-9413-6A7BEAA6A3CA",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BBB18487-735C-4663-90FF-B2A17F725CEE",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3A44103A-AFAD-45FD-A40B-22AD0E02857C",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpq24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B368AC9-CEDA-4D9A-BE58-384E01E581A1",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CC923696-6BD3-47BB-A87A-92005F9969F4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9711E78E-0D83-42DB-9D7A-16F4F9A9DAA4",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "0CFF3C55-6890-4E40-99C5-C3AA7FA10526",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bps24r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BC8912C2-F121-4684-B264-871708D17E69",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:compute_module_hns2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB1A914A-D272-4CB0-9094-94C1FF4F3085",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:server_board_s2600bp_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B5CD6EE2-3897-4176-B3B0-B810D0C4A717",
              "versionEndExcluding": "2.45",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpb:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E7B114F-1EA0-40D5-BA2D-8EC268A30530",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpbr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1EF2A748-40E2-4F2E-9516-78C9E6DBA4AF",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpq:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "2C243BA0-42DD-417A-B080-F102A3C53CCD",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpqr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5674D660-DEB6-4AF9-8B0D-F57ECC4DC533",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bps:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C2EB283-D51C-495C-A645-AD27293A25FC",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:h:intel:server_board_s2600bpsr:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "76ACEDD9-68F4-4EFE-9725-16447C18291C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Buffer overflow in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Un desbordamiento del b\u00fafer en el cargador de arranque para algunos Intel\u00ae Server Boards, Server Systems y Compute Modules  versiones anteriores a  2.45, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-8710",
  "lastModified": "2024-11-21T05:39:18.517",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 6.7,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "HIGH",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 0.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T03:15:15.243",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-120"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

cve-2020-8730
Vulnerability from cvelistv5
Published
2020-08-13 02:24
Modified
2024-08-04 10:12
Severity ?
Summary
Heap-based overflow for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.532Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based overflow for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:17",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8730",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based overflow for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8730",
    "datePublished": "2020-08-13T02:24:32",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.532Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8706
Vulnerability from cvelistv5
Published
2020-08-13 02:55
Modified
2024-08-04 10:03
Severity ?
Summary
Buffer overflow in a daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.508Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in a daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:16",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8706",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in a daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8706",
    "datePublished": "2020-08-13T02:55:38",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.508Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-24475
Vulnerability from cvelistv5
Published
2021-06-09 19:01
Modified
2024-08-04 15:12
Severity ?
Summary
Improper initialization in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:12:08.742Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 2.48.ce3e3bd2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper initialization in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "denial of service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-09T19:01:50",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-24475",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 2.48.ce3e3bd2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper initialization in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "denial of service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-24475",
    "datePublished": "2021-06-09T19:01:50",
    "dateReserved": "2020-08-19T00:00:00",
    "dateUpdated": "2024-08-04T15:12:08.742Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-24474
Vulnerability from cvelistv5
Published
2021-06-09 19:01
Modified
2024-08-04 15:12
Severity ?
Summary
Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:12:09.228Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 2.48.ce3e3bd2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-09T19:01:40",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-24474",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 2.48.ce3e3bd2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "escalation of privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-24474",
    "datePublished": "2021-06-09T19:01:40",
    "dateReserved": "2020-08-19T00:00:00",
    "dateUpdated": "2024-08-04T15:12:09.228Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8718
Vulnerability from cvelistv5
Published
2020-08-13 02:43
Modified
2024-08-04 10:12
Severity ?
Summary
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.520Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:19",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8718",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8718",
    "datePublished": "2020-08-13T02:43:18",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.520Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8713
Vulnerability from cvelistv5
Published
2020-08-13 02:53
Modified
2024-08-04 10:03
Severity ?
Summary
Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.372Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:16",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8713",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8713",
    "datePublished": "2020-08-13T02:53:56",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.372Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8714
Vulnerability from cvelistv5
Published
2020-08-13 03:00
Modified
2024-08-04 10:03
Severity ?
Summary
Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.333Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:14",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8714",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8714",
    "datePublished": "2020-08-13T03:00:02",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.333Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8729
Vulnerability from cvelistv5
Published
2020-08-13 02:56
Modified
2024-08-04 10:12
Severity ?
Summary
Buffer copy without checking size of input for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.571Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer copy without checking size of input for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:09",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8729",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer copy without checking size of input for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8729",
    "datePublished": "2020-08-13T02:56:11",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.571Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8711
Vulnerability from cvelistv5
Published
2020-08-13 02:42
Modified
2024-08-04 10:03
Severity ?
Summary
Improper access control in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.440Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 2.45"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:22",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8711",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 2.45"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper access control in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8711",
    "datePublished": "2020-08-13T02:42:10",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.440Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8716
Vulnerability from cvelistv5
Published
2020-08-13 02:59
Modified
2024-08-04 10:03
Severity ?
Summary
Improper access control for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.291Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper access control for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:10",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8716",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper access control for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8716",
    "datePublished": "2020-08-13T02:59:24",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.291Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8709
Vulnerability from cvelistv5
Published
2020-08-13 02:52
Modified
2024-08-04 10:03
Severity ?
Summary
Improper authentication in socket services for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.375Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 2.45"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper authentication in socket services for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:13",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8709",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 2.45"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper authentication in socket services for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8709",
    "datePublished": "2020-08-13T02:52:30",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.375Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8708
Vulnerability from cvelistv5
Published
2020-08-13 02:23
Modified
2024-08-04 10:03
Severity ?
Summary
Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.365Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:10",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8708",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper authentication for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8708",
    "datePublished": "2020-08-13T02:23:36",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.365Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8707
Vulnerability from cvelistv5
Published
2020-08-13 02:27
Modified
2024-08-04 10:03
Severity ?
Summary
Buffer overflow in daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.267Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:12",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8707",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in daemon for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8707",
    "datePublished": "2020-08-13T02:27:58",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.267Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8719
Vulnerability from cvelistv5
Published
2020-08-13 02:29
Modified
2024-08-04 10:12
Severity ?
Summary
Buffer overflow in subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.465Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:21",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8719",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8719",
    "datePublished": "2020-08-13T02:29:56",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.465Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8721
Vulnerability from cvelistv5
Published
2020-08-13 02:30
Modified
2024-08-04 10:12
Severity ?
Summary
Improper input validation for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.572Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:14",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8721",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8721",
    "datePublished": "2020-08-13T02:30:43",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.572Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8720
Vulnerability from cvelistv5
Published
2020-08-13 03:11
Modified
2024-08-04 10:12
Severity ?
Summary
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.519Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:11",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8720",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8720",
    "datePublished": "2020-08-13T03:11:24",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.519Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8717
Vulnerability from cvelistv5
Published
2020-08-13 03:00
Modified
2024-08-04 10:12
Severity ?
Summary
Improper input validation in a subsystem for some Intel Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.231Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Improper input validation in a subsystem for some Intel Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:15",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8717",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Improper input validation in a subsystem for some Intel Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8717",
    "datePublished": "2020-08-13T03:00:44",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.231Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8715
Vulnerability from cvelistv5
Published
2020-08-13 02:57
Modified
2024-08-04 10:03
Severity ?
Summary
Invalid pointer for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable denial of service via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.387Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Invalid pointer for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable denial of service via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Denial of Service",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:12",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8715",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Invalid pointer for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable denial of service via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Denial of Service"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8715",
    "datePublished": "2020-08-13T02:57:13",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.387Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8710
Vulnerability from cvelistv5
Published
2020-08-13 02:31
Modified
2024-08-04 10:03
Severity ?
Summary
Buffer overflow in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.275Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 2.45"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:22",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8710",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 2.45"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in the bootloader for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8710",
    "datePublished": "2020-08-13T02:31:24",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.275Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8732
Vulnerability from cvelistv5
Published
2020-08-13 02:52
Modified
2024-08-04 10:12
Severity ?
Summary
Heap-based buffer overflow in the firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.230Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in the firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:23",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8732",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in the firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8732",
    "datePublished": "2020-08-13T02:52:04",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.230Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8731
Vulnerability from cvelistv5
Published
2020-08-13 02:26
Modified
2024-08-04 10:12
Severity ?
Summary
Incorrect execution-assigned permissions in the file system for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.512Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Incorrect execution-assigned permissions in the file system for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:19",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8731",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Incorrect execution-assigned permissions in the file system for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8731",
    "datePublished": "2020-08-13T02:26:24",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.512Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8723
Vulnerability from cvelistv5
Published
2020-08-13 02:53
Modified
2024-08-04 10:12
Severity ?
Summary
Cross-site scripting for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.630Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Cross-site scripting for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:18",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8723",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Cross-site scripting for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8723",
    "datePublished": "2020-08-13T02:53:26",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.630Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-24473
Vulnerability from cvelistv5
Published
2021-06-09 19:01
Modified
2024-08-04 15:12
Severity ?
Summary
Out of bounds write in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T15:12:08.965Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "before version 2.48.ce3e3bd2"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Out of bounds write in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "escalation of privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-06-09T19:01:45",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-24473",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "before version 2.48.ce3e3bd2"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Out of bounds write in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.48.ce3e3bd2 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "escalation of privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00476.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-24473",
    "datePublished": "2021-06-09T19:01:45",
    "dateReserved": "2020-08-19T00:00:00",
    "dateUpdated": "2024-08-04T15:12:08.965Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8722
Vulnerability from cvelistv5
Published
2020-08-13 02:51
Modified
2024-08-04 10:12
Severity ?
Summary
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:12:09.218Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 1.59"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:17",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8722",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 1.59"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8722",
    "datePublished": "2020-08-13T02:51:27",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:12:09.218Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-8712
Vulnerability from cvelistv5
Published
2020-08-13 02:42
Modified
2024-08-04 10:03
Severity ?
Summary
Buffer overflow in a verification process for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T10:03:46.478Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Before version 2.45"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in a verification process for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an authenticated user to potentially enable escalation of privilege via local access."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Escalation of Privilege",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2020-08-14T11:06:20",
        "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
        "shortName": "intel"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "secure@intel.com",
          "ID": "CVE-2020-8712",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Intel(R) Server Boards, Server Systems and Compute Modules Advisory",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Before version 2.45"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in a verification process for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.45 may allow an authenticated user to potentially enable escalation of privilege via local access."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Escalation of Privilege"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html",
              "refsource": "MISC",
              "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20200814-0002/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20200814-0002/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
    "assignerShortName": "intel",
    "cveId": "CVE-2020-8712",
    "datePublished": "2020-08-13T02:42:49",
    "dateReserved": "2020-02-06T00:00:00",
    "dateUpdated": "2024-08-04T10:03:46.478Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}