All the vulnerabilites related to siemens - simatic_itp1000_firmware
cve-2021-42554
Vulnerability from cvelistv5
Published
2022-02-03 01:40
Modified
2024-08-04 03:38
Severity ?
EPSS score ?
Summary
An issue was discovered in Insyde InsydeH2O with Kernel 5.0 before 05.08.42, Kernel 5.1 before 05.16.42, Kernel 5.2 before 05.26.42, Kernel 5.3 before 05.35.42, Kernel 5.4 before 05.42.51, and Kernel 5.5 before 05.50.51. An SMM memory corruption vulnerability in FvbServicesRuntimeDxe allows a possible attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM.
References
▼ | URL | Tags |
---|---|---|
https://www.insyde.com/security-pledge | x_refsource_MISC | |
https://www.insyde.com/security-pledge/SA-2022012 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20220216-0007/ | x_refsource_CONFIRM | |
https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:38:49.251Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.insyde.com/security-pledge" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.insyde.com/security-pledge/SA-2022012" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220216-0007/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Insyde InsydeH2O with Kernel 5.0 before 05.08.42, Kernel 5.1 before 05.16.42, Kernel 5.2 before 05.26.42, Kernel 5.3 before 05.35.42, Kernel 5.4 before 05.42.51, and Kernel 5.5 before 05.50.51. An SMM memory corruption vulnerability in FvbServicesRuntimeDxe allows a possible attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T19:06:40", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.insyde.com/security-pledge" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.insyde.com/security-pledge/SA-2022012" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220216-0007/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42554", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Insyde InsydeH2O with Kernel 5.0 before 05.08.42, Kernel 5.1 before 05.16.42, Kernel 5.2 before 05.26.42, Kernel 5.3 before 05.35.42, Kernel 5.4 before 05.42.51, and Kernel 5.5 before 05.50.51. An SMM memory corruption vulnerability in FvbServicesRuntimeDxe allows a possible attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.insyde.com/security-pledge", "refsource": "MISC", "url": "https://www.insyde.com/security-pledge" }, { "name": "https://www.insyde.com/security-pledge/SA-2022012", "refsource": "MISC", "url": "https://www.insyde.com/security-pledge/SA-2022012" }, { "name": "https://security.netapp.com/advisory/ntap-20220216-0007/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220216-0007/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42554", "datePublished": "2022-02-03T01:40:56", "dateReserved": "2021-10-18T00:00:00", "dateUpdated": "2024-08-04T03:38:49.251Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-3658
Vulnerability from cvelistv5
Published
2018-09-12 19:00
Modified
2024-09-16 22:35
Severity ?
EPSS score ?
Summary
Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.
References
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf | x_refsource_CONFIRM | |
https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05 | x_refsource_MISC | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/106996 | vdb-entry, x_refsource_BID | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20180924-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Active Management Technology |
Version: Versions before 12.0.5. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.323Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106996" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Active Management Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Versions before 12.0.5." } ] } ], "datePublic": "2018-09-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service, Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-25T22:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106996" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-09-11T00:00:00", "ID": "CVE-2018-3658", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Active Management Technology", "version": { "version_data": [ { "version_value": "Versions before 12.0.5." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service, Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106996" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20180924-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3658", "datePublished": "2018-09-12T19:00:00Z", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-09-16T22:35:54.845Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-3657
Vulnerability from cvelistv5
Published
2018-09-12 19:00
Modified
2024-09-16 20:01
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf | x_refsource_CONFIRM | |
https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05 | x_refsource_MISC | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/106996 | vdb-entry, x_refsource_BID | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20180924-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Active Management Technology |
Version: Versions before version 12.0.5. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.304Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106996" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Active Management Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Versions before version 12.0.5." } ] } ], "datePublic": "2018-09-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service, Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-25T22:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106996" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-09-11T00:00:00", "ID": "CVE-2018-3657", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Active Management Technology", "version": { "version_data": [ { "version_value": "Versions before version 12.0.5." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service, Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106996" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20180924-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3657", "datePublished": "2018-09-12T19:00:00Z", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-09-16T20:01:21.908Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-33625
Vulnerability from cvelistv5
Published
2022-02-03 01:55
Modified
2024-08-03 23:58
Severity ?
EPSS score ?
Summary
An issue was discovered in Kernel 5.x in Insyde InsydeH2O, affecting HddPassword. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses.
References
▼ | URL | Tags |
---|---|---|
https://www.insyde.com/security-pledge | x_refsource_MISC | |
https://www.insyde.com/security-pledge/SA-2022014 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20220222-0004/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:58:21.414Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.insyde.com/security-pledge" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.insyde.com/security-pledge/SA-2022014" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0004/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Kernel 5.x in Insyde InsydeH2O, affecting HddPassword. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-23T15:06:25", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.insyde.com/security-pledge" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.insyde.com/security-pledge/SA-2022014" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0004/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-33625", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Kernel 5.x in Insyde InsydeH2O, affecting HddPassword. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.insyde.com/security-pledge", "refsource": "MISC", "url": "https://www.insyde.com/security-pledge" }, { "name": "https://www.insyde.com/security-pledge/SA-2022014", "refsource": "MISC", "url": "https://www.insyde.com/security-pledge/SA-2022014" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "name": "https://security.netapp.com/advisory/ntap-20220222-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220222-0004/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-33625", "datePublished": "2022-02-03T01:55:10", "dateReserved": "2021-05-28T00:00:00", "dateUpdated": "2024-08-03T23:58:21.414Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-12357
Vulnerability from cvelistv5
Published
2021-06-09 18:49
Modified
2024-08-04 11:56
Severity ?
EPSS score ?
Summary
Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20210702-0002/ | x_refsource_CONFIRM | |
https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) Processors |
Version: See references |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T11:56:51.310Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210702-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Processors", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-10T11:06:41", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210702-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-12357", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Processors", "version": { "version_data": [ { "version_value": "See references" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "escalation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210702-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210702-0002/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-12357", "datePublished": "2021-06-09T18:49:02", "dateReserved": "2020-04-28T00:00:00", "dateUpdated": "2024-08-04T11:56:51.310Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8704
Vulnerability from cvelistv5
Published
2021-06-09 18:47
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
Race condition in a subsystem in the Intel(R) LMS versions before 2039.1.0.0 may allow a privileged user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) LMS versions |
Version: versions before 2039.1.0.0 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:46.322Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) LMS versions", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions before 2039.1.0.0" } ] } ], "descriptions": [ { "lang": "en", "value": "Race condition in a subsystem in the Intel(R) LMS versions before 2039.1.0.0 may allow a privileged user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-10T11:06:35", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-8704", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) LMS versions", "version": { "version_data": [ { "version_value": "versions before 2039.1.0.0" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in a subsystem in the Intel(R) LMS versions before 2039.1.0.0 may allow a privileged user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "escalation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-8704", "datePublished": "2021-06-09T18:47:41", "dateReserved": "2020-02-06T00:00:00", "dateUpdated": "2024-08-04T10:03:46.322Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41837
Vulnerability from cvelistv5
Published
2022-02-03 01:23
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
An issue was discovered in AhciBusDxe in the kernel 5.0 through 5.5 in Insyde InsydeH2O. Because of an Untrusted Pointer Dereference that causes SMM memory corruption, an attacker may be able to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM.
References
▼ | URL | Tags |
---|---|---|
https://www.insyde.com/security-pledge | x_refsource_MISC | |
https://www.insyde.com/security-pledge/SA-2022024 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20220222-0003/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.091Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.insyde.com/security-pledge" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.insyde.com/security-pledge/SA-2022024" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in AhciBusDxe in the kernel 5.0 through 5.5 in Insyde InsydeH2O. Because of an Untrusted Pointer Dereference that causes SMM memory corruption, an attacker may be able to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-23T15:06:18", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.insyde.com/security-pledge" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.insyde.com/security-pledge/SA-2022024" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41837", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in AhciBusDxe in the kernel 5.0 through 5.5 in Insyde InsydeH2O. Because of an Untrusted Pointer Dereference that causes SMM memory corruption, an attacker may be able to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.insyde.com/security-pledge", "refsource": "MISC", "url": "https://www.insyde.com/security-pledge" }, { "name": "https://www.insyde.com/security-pledge/SA-2022024", "refsource": "MISC", "url": "https://www.insyde.com/security-pledge/SA-2022024" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "name": "https://security.netapp.com/advisory/ntap-20220222-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220222-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-41837", "datePublished": "2022-02-03T01:23:39", "dateReserved": "2021-10-01T00:00:00", "dateUpdated": "2024-08-04T03:22:25.091Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-33627
Vulnerability from cvelistv5
Published
2022-02-03 01:30
Modified
2024-08-03 23:58
Severity ?
EPSS score ?
Summary
An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.09.11, 5.1 before 05.17.11, 5.2 before 05.27.11, 5.3 before 05.36.11, 5.4 before 05.44.11, and 5.5 before 05.52.11 affecting FwBlockServiceSmm. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:58:21.427Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.insyde.com/security-pledge" }, { "tags": [ "x_transferred" ], "url": "https://www.insyde.com/security-pledge/SA-2022022" }, { "tags": [ "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0002/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.09.11, 5.1 before 05.17.11, 5.2 before 05.27.11, 5.3 before 05.36.11, 5.4 before 05.44.11, and 5.5 before 05.52.11 affecting FwBlockServiceSmm. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2024-07-22T16:50:10.835493", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.insyde.com/security-pledge" }, { "url": "https://www.insyde.com/security-pledge/SA-2022022" }, { "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "url": "https://security.netapp.com/advisory/ntap-20220222-0002/" } ] } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-33627", "datePublished": "2022-02-03T01:30:36", "dateReserved": "2021-05-28T00:00:00", "dateUpdated": "2024-08-03T23:58:21.427Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-42059
Vulnerability from cvelistv5
Published
2022-02-03 01:13
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.08.41, Kernel 5.1 before 05.16.41, Kernel 5.2 before 05.26.41, Kernel 5.3 before 05.35.41, and Kernel 5.4 before 05.42.20. A stack-based buffer overflow leads toarbitrary code execution in UEFI DisplayTypeDxe DXE driver.
References
▼ | URL | Tags |
---|---|---|
https://www.insyde.com/security-pledge | x_refsource_MISC | |
https://www.insyde.com/security-pledge/SA-2022006 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20220216-0008/ | x_refsource_CONFIRM | |
https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:25.776Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.insyde.com/security-pledge" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.insyde.com/security-pledge/SA-2022006" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220216-0008/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.08.41, Kernel 5.1 before 05.16.41, Kernel 5.2 before 05.26.41, Kernel 5.3 before 05.35.41, and Kernel 5.4 before 05.42.20. A stack-based buffer overflow leads toarbitrary code execution in UEFI DisplayTypeDxe DXE driver." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T19:06:27", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.insyde.com/security-pledge" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.insyde.com/security-pledge/SA-2022006" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220216-0008/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-42059", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.08.41, Kernel 5.1 before 05.16.41, Kernel 5.2 before 05.26.41, Kernel 5.3 before 05.35.41, and Kernel 5.4 before 05.42.20. A stack-based buffer overflow leads toarbitrary code execution in UEFI DisplayTypeDxe DXE driver." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.insyde.com/security-pledge", "refsource": "MISC", "url": "https://www.insyde.com/security-pledge" }, { "name": "https://www.insyde.com/security-pledge/SA-2022006", "refsource": "MISC", "url": "https://www.insyde.com/security-pledge/SA-2022006" }, { "name": "https://security.netapp.com/advisory/ntap-20220216-0008/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220216-0008/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-42059", "datePublished": "2022-02-03T01:13:47", "dateReserved": "2021-10-07T00:00:00", "dateUpdated": "2024-08-04T03:22:25.776Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-3616
Vulnerability from cvelistv5
Published
2018-09-12 19:00
Modified
2024-09-16 16:53
Severity ?
EPSS score ?
Summary
Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network.
References
▼ | URL | Tags |
---|---|---|
https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf | x_refsource_CONFIRM | |
https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05 | x_refsource_MISC | |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/106996 | vdb-entry, x_refsource_BID | |
https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03876en_us | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20180924-0003/ | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Intel(R) Active Management Technology |
Version: Versions before 12.0.5. |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.382Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/106996" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Active Management Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Versions before 12.0.5." } ] } ], "datePublic": "2018-09-11T00:00:00", "descriptions": [ { "lang": "en", "value": "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service, Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-02-25T22:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "tags": [ "x_refsource_MISC" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/106996" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-09-11T00:00:00", "ID": "CVE-2018-3616", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Active Management Technology", "version": { "version_data": [ { "version_value": "Versions before 12.0.5." } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service, Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "name": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05", "refsource": "MISC", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "name": "106996", "refsource": "BID", "url": "http://www.securityfocus.com/bid/106996" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "name": "https://security.netapp.com/advisory/ntap-20180924-0003/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3616", "datePublished": "2018-09-12T19:00:00Z", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-09-16T16:53:35.507Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8698
Vulnerability from cvelistv5
Published
2020-11-12 18:01
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0006/ | x_refsource_CONFIRM | |
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/ | vendor-advisory, x_refsource_FEDORA | |
https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html | mailing-list, x_refsource_MLIST | |
https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) Processors |
Version: See references |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:46.326Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0006/" }, { "name": "FEDORA-2020-14fda1bf85", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/" }, { "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Processors", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "information disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-11T12:06:29", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0006/" }, { "name": "FEDORA-2020-14fda1bf85", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/" }, { "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-8698", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Processors", "version": { "version_data": [ { "version_value": "See references" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "information disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381" }, { "name": "https://security.netapp.com/advisory/ntap-20201113-0006/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201113-0006/" }, { "name": "FEDORA-2020-14fda1bf85", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/" }, { "name": "[debian-lts-announce] 20210205 [SECURITY] [DLA 2546-1] intel-microcode security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-8698", "datePublished": "2020-11-12T18:01:55", "dateReserved": "2020-02-06T00:00:00", "dateUpdated": "2024-08-04T10:03:46.326Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-27339
Vulnerability from cvelistv5
Published
2021-06-16 15:49
Modified
2024-08-04 16:11
Severity ?
EPSS score ?
Summary
In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the AhciBusDxe, IdeBusDxe, NvmExpressDxe, SdHostDriverDxe, and SdMmcDeviceDxe drivers are 05.16.25, 05.26.25, 05.35.25, 05.43.25, and 05.51.25 (for Kernel 5.1 through 5.5).
References
▼ | URL | Tags |
---|---|---|
https://www.insyde.com/security-pledge/SA-2021001 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20220216-0005/ | x_refsource_CONFIRM | |
https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T16:11:36.601Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.insyde.com/security-pledge/SA-2021001" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220216-0005/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the AhciBusDxe, IdeBusDxe, NvmExpressDxe, SdHostDriverDxe, and SdMmcDeviceDxe drivers are 05.16.25, 05.26.25, 05.35.25, 05.43.25, and 05.51.25 (for Kernel 5.1 through 5.5)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T19:07:12", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.insyde.com/security-pledge/SA-2021001" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220216-0005/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-27339", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the AhciBusDxe, IdeBusDxe, NvmExpressDxe, SdHostDriverDxe, and SdMmcDeviceDxe drivers are 05.16.25, 05.26.25, 05.35.25, 05.43.25, and 05.51.25 (for Kernel 5.1 through 5.5)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.insyde.com/security-pledge/SA-2021001", "refsource": "MISC", "url": "https://www.insyde.com/security-pledge/SA-2021001" }, { "name": "https://security.netapp.com/advisory/ntap-20220216-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220216-0005/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-27339", "datePublished": "2021-06-16T15:49:34", "dateReserved": "2020-10-20T00:00:00", "dateUpdated": "2024-08-04T16:11:36.601Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8703
Vulnerability from cvelistv5
Published
2021-06-09 18:48
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
Improper buffer restrictions in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32 and 15.0.22 may allow a privileged user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20210611-0004/ | x_refsource_CONFIRM | |
https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) CSME versions |
Version: versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32 and 15.0.22 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:46.284Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0004/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) CSME versions", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32 and 15.0.22" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper buffer restrictions in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32 and 15.0.22 may allow a privileged user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-10T11:06:31", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0004/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-8703", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) CSME versions", "version": { "version_data": [ { "version_value": "versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32 and 15.0.22" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper buffer restrictions in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32 and 15.0.22 may allow a privileged user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "escalation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210611-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210611-0004/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-8703", "datePublished": "2021-06-09T18:48:39", "dateReserved": "2020-02-06T00:00:00", "dateUpdated": "2024-08-04T10:03:46.284Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8670
Vulnerability from cvelistv5
Published
2021-06-09 18:50
Modified
2024-08-04 10:03
Severity ?
EPSS score ?
Summary
Race condition in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20210702-0002/ | x_refsource_CONFIRM | |
https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) Processors |
Version: See references |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:03:46.319Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210702-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Processors", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See references" } ] } ], "descriptions": [ { "lang": "en", "value": "Race condition in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-10T11:06:22", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210702-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-8670", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Processors", "version": { "version_data": [ { "version_value": "See references" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Race condition in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "escalation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210702-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210702-0002/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-8670", "datePublished": "2021-06-09T18:50:23", "dateReserved": "2020-02-06T00:00:00", "dateUpdated": "2024-08-04T10:03:46.319Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-0543
Vulnerability from cvelistv5
Published
2020-06-15 13:55
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) Processors |
Version: See provided reference |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.330Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html" }, { "name": "USN-4385-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4385-1/" }, { "name": "USN-4388-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4388-1/" }, { "name": "openSUSE-SU-2020:0818", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html" }, { "name": "USN-4392-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4392-1/" }, { "name": "USN-4393-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4393-1/" }, { "name": "USN-4389-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4389-1/" }, { "name": "USN-4387-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4387-1/" }, { "name": "FEDORA-2020-3364913ace", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/" }, { "name": "FEDORA-2020-e8835a5f8e", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/" }, { "name": "USN-4390-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4390-1/" }, { "name": "USN-4391-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/4391-1/" }, { "name": "FEDORA-2020-11ddbfbdf0", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/" }, { "name": "[oss-security] 20200714 Flatcar membership on the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/14/5" }, { "name": "openSUSE-SU-2020:0965", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" }, { "name": "openSUSE-SU-2020:0985", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318" }, { "name": "FEDORA-2020-1afbe7ba2d", "tags": [ "vendor-advisory", "x_refsource_FEDORA", "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) Processors", "vendor": "n/a", "versions": [ { "status": "affected", "version": "See provided reference" } ] } ], "descriptions": [ { "lang": "en", "value": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-11-29T02:06:12", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html" }, { "name": "USN-4385-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4385-1/" }, { "name": "USN-4388-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4388-1/" }, { "name": "openSUSE-SU-2020:0818", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html" }, { "name": "USN-4392-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4392-1/" }, { "name": "USN-4393-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4393-1/" }, { "name": "USN-4389-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4389-1/" }, { "name": "USN-4387-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4387-1/" }, { "name": "FEDORA-2020-3364913ace", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/" }, { "name": "FEDORA-2020-e8835a5f8e", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/" }, { "name": "USN-4390-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4390-1/" }, { "name": "USN-4391-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/4391-1/" }, { "name": "FEDORA-2020-11ddbfbdf0", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/" }, { "name": "[oss-security] 20200714 Flatcar membership on the linux-distros list", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/14/5" }, { "name": "openSUSE-SU-2020:0965", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" }, { "name": "openSUSE-SU-2020:0985", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318" }, { "name": "FEDORA-2020-1afbe7ba2d", "tags": [ "vendor-advisory", "x_refsource_FEDORA" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0543", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) Processors", "version": { "version_data": [ { "version_value": "See provided reference" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html" }, { "name": "USN-4385-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4385-1/" }, { "name": "USN-4388-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4388-1/" }, { "name": "openSUSE-SU-2020:0818", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html" }, { "name": "USN-4392-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4392-1/" }, { "name": "USN-4393-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4393-1/" }, { "name": "USN-4389-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4389-1/" }, { "name": "USN-4387-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4387-1/" }, { "name": "FEDORA-2020-3364913ace", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/" }, { "name": "FEDORA-2020-e8835a5f8e", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/" }, { "name": "USN-4390-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4390-1/" }, { "name": "USN-4391-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/4391-1/" }, { "name": "FEDORA-2020-11ddbfbdf0", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/" }, { "name": "[oss-security] 20200714 Flatcar membership on the linux-distros list", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/07/14/5" }, { "name": "openSUSE-SU-2020:0965", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" }, { "name": "openSUSE-SU-2020:0985", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf" }, { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318" }, { "name": "FEDORA-2020-1afbe7ba2d", "refsource": "FEDORA", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0543", "datePublished": "2020-06-15T13:55:00", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.330Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5711
Vulnerability from cvelistv5
Published
2017-11-21 14:00
Modified
2024-09-16 19:20
Severity ?
EPSS score ?
Summary
Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege.
References
▼ | URL | Tags |
---|---|---|
https://security.netapp.com/advisory/ntap-20171120-0001/ | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039852 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/101918 | vdb-entry, x_refsource_BID | |
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr | x_refsource_CONFIRM | |
https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf | x_refsource_CONFIRM | |
https://www.asus.com/News/wzeltG5CjYaIwGJ0 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Active Management Technology |
Version: 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.562Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "name": "1039852", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039852" }, { "name": "101918", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101918" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Active Management Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20" } ] } ], "datePublic": "2017-11-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege." } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-10T09:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "name": "1039852", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039852" }, { "name": "101918", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101918" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2017-11-20T00:00:00", "ID": "CVE-2017-5711", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Active Management Technology", "version": { "version_data": [ { "version_value": "8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.netapp.com/advisory/ntap-20171120-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "name": "1039852", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039852" }, { "name": "101918", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101918" }, { "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr", "refsource": "CONFIRM", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "name": "https://www.asus.com/News/wzeltG5CjYaIwGJ0", "refsource": "CONFIRM", "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-5711", "datePublished": "2017-11-21T14:00:00Z", "dateReserved": "2017-02-01T00:00:00", "dateUpdated": "2024-09-16T19:20:12.640Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2018-3639
Vulnerability from cvelistv5
Published
2018-05-22 12:00
Modified
2024-09-16 22:55
Severity ?
EPSS score ?
Summary
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Multiple |
Version: Multiple |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:50:30.281Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "RHSA-2018:1689", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1689" }, { "name": "RHSA-2018:2162", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2162" }, { "name": "RHSA-2018:1641", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1641" }, { "name": "USN-3680-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3680-1/" }, { "name": "RHSA-2018:1997", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1997" }, { "name": "RHSA-2018:1665", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1665" }, { "name": "RHSA-2018:3407", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3407" }, { "name": "RHSA-2018:2164", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2164" }, { "name": "RHSA-2018:2001", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2001" }, { "name": "RHSA-2018:3423", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3423" }, { "name": "RHSA-2018:2003", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2003" }, { "name": "USN-3654-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3654-1/" }, { "name": "RHSA-2018:1645", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1645" }, { "name": "RHSA-2018:1643", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1643" }, { "name": "RHSA-2018:1652", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1652" }, { "name": "RHSA-2018:3424", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3424" }, { "name": "RHSA-2018:3402", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3402" }, { "name": "TA18-141A", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "https://www.us-cert.gov/ncas/alerts/TA18-141A" }, { "name": "RHSA-2018:1656", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1656" }, { "name": "RHSA-2018:1664", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1664" }, { "name": "RHSA-2018:2258", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2258" }, { "name": "RHSA-2018:1688", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1688" }, { "name": "RHSA-2018:1658", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1658" }, { "name": "RHSA-2018:1657", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1657" }, { "name": "RHSA-2018:2289", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2289" }, { "name": "RHSA-2018:1666", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1666" }, { "name": "1042004", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1042004" }, { "name": "RHSA-2018:1675", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1675" }, { "name": "RHSA-2018:1660", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1660" }, { "name": "RHSA-2018:1965", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1965" }, { "name": "RHSA-2018:1661", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1661" }, { "name": "RHSA-2018:1633", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1633" }, { "name": "RHSA-2018:1636", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1636" }, { "name": "RHSA-2018:1854", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "name": "RHSA-2018:2006", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2006" }, { "name": "RHSA-2018:2250", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2250" }, { "name": "1040949", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040949" }, { "name": "RHSA-2018:3401", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3401" }, { "name": "RHSA-2018:1737", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1737" }, { "name": "RHSA-2018:1826", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1826" }, { "name": "USN-3651-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3651-1/" }, { "name": "DSA-4210", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4210" }, { "name": "44695", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/44695/" }, { "name": "RHSA-2018:1651", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1651" }, { "name": "RHSA-2018:1638", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1638" }, { "name": "RHSA-2018:1696", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1696" }, { "name": "RHSA-2018:2246", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2246" }, { "name": "RHSA-2018:1644", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1644" }, { "name": "RHSA-2018:1646", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1646" }, { "name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "name": "RHSA-2018:1639", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1639" }, { "name": "RHSA-2018:1668", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1668" }, { "name": "RHSA-2018:1637", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1637" }, { "name": "RHSA-2018:2948", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "name": "VU#180049", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "name": "RHSA-2018:1686", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1686" }, { "name": "RHSA-2018:2172", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2172" }, { "name": "RHSA-2018:1663", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1663" }, { "name": "USN-3652-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3652-1/" }, { "name": "RHSA-2018:1629", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1629" }, { "name": "RHSA-2018:1655", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1655" }, { "name": "RHSA-2018:1640", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1640" }, { "name": "RHSA-2018:1669", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1669" }, { "name": "RHSA-2018:1676", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1676" }, { "name": "20180522 CPU Side-Channel Information Disclosure Vulnerabilities: May 2018", "tags": [ "vendor-advisory", "x_refsource_CISCO", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel" }, { "name": "RHSA-2018:3425", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3425" }, { "name": "RHSA-2018:2363", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2363" }, { "name": "RHSA-2018:1632", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1632" }, { "name": "RHSA-2018:1650", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1650" }, { "name": "RHSA-2018:2396", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "name": "RHSA-2018:2364", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2364" }, { "name": "USN-3653-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3653-2/" }, { "name": "RHSA-2018:2216", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2216" }, { "name": "USN-3655-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3655-1/" }, { "name": "RHSA-2018:1649", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1649" }, { "name": "RHSA-2018:2309", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2309" }, { "name": "104232", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104232" }, { "name": "RHSA-2018:1653", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1653" }, { "name": "RHSA-2018:2171", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2171" }, { "name": "RHSA-2018:1635", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1635" }, { "name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "name": "RHSA-2018:2394", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "name": "RHSA-2018:1710", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1710" }, { "name": "RHSA-2018:1659", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1659" }, { "name": "RHSA-2018:1711", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1711" }, { "name": "DSA-4273", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "https://www.debian.org/security/2018/dsa-4273" }, { "name": "RHSA-2018:1738", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1738" }, { "name": "RHSA-2018:1674", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1674" }, { "name": "RHSA-2018:3396", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3396" }, { "name": "RHSA-2018:1667", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1667" }, { "name": "USN-3654-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3654-2/" }, { "name": "RHSA-2018:1662", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1662" }, { "name": "RHSA-2018:1630", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1630" }, { "name": "RHSA-2018:1647", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1647" }, { "name": "RHSA-2018:1967", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1967" }, { "name": "USN-3655-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3655-2/" }, { "name": "RHSA-2018:3399", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3399" }, { "name": "RHSA-2018:2060", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2060" }, { "name": "RHSA-2018:1690", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1690" }, { "name": "USN-3653-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3653-1/" }, { "name": "RHSA-2018:2161", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2161" }, { "name": "[debian-lts-announce] 20180727 [SECURITY] [DLA 1446-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html" }, { "name": "RHSA-2018:2328", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2328" }, { "name": "RHSA-2018:1648", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1648" }, { "name": "RHSA-2018:2387", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "name": "RHSA-2019:0148", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:0148" }, { "name": "RHSA-2018:1654", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1654" }, { "name": "USN-3679-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3679-1/" }, { "name": "USN-3777-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3777-3/" }, { "name": "RHSA-2018:1642", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:1642" }, { "name": "RHSA-2018:3397", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3397" }, { "name": "[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html" }, { "name": "USN-3756-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU", "x_transferred" ], "url": "https://usn.ubuntu.com/3756-1/" }, { "name": "RHSA-2018:3398", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3398" }, { "name": "RHSA-2018:3400", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:3400" }, { "name": "RHSA-2018:2228", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2018:2228" }, { "name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "name": "RHSA-2019:1046", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "https://access.redhat.com/errata/RHSA-2019:1046" }, { "name": "openSUSE-SU-2019:1439", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" }, { "name": "openSUSE-SU-2019:1438", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html" }, { "name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "name": "[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/10/1" }, { "name": "[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/10/2" }, { "name": "[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768", "tags": [ "mailing-list", "x_refsource_MLIST", "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/10/5" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://support.lenovo.com/us/en/solutions/LEN-22133" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX235225" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_18_23" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://xenbits.xen.org/xsa/advisory-263.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03850en_us" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20180521-0001/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html" }, { "name": "openSUSE-SU-2020:1325", "tags": [ "vendor-advisory", "x_refsource_SUSE", "x_transferred" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Multiple", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "Multiple" } ] } ], "datePublic": "2018-05-21T00:00:00", "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4." } ], "problemTypes": [ { "descriptions": [ { "description": "Information Disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-09-02T20:06:27", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "name": "RHSA-2018:1689", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1689" }, { "name": "RHSA-2018:2162", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2162" }, { "name": "RHSA-2018:1641", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1641" }, { "name": "USN-3680-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3680-1/" }, { "name": "RHSA-2018:1997", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1997" }, { "name": "RHSA-2018:1665", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1665" }, { "name": "RHSA-2018:3407", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3407" }, { "name": "RHSA-2018:2164", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2164" }, { "name": "RHSA-2018:2001", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2001" }, { "name": "RHSA-2018:3423", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3423" }, { "name": "RHSA-2018:2003", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2003" }, { "name": "USN-3654-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3654-1/" }, { "name": "RHSA-2018:1645", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1645" }, { "name": "RHSA-2018:1643", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1643" }, { "name": "RHSA-2018:1652", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1652" }, { "name": "RHSA-2018:3424", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3424" }, { "name": "RHSA-2018:3402", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3402" }, { "name": "TA18-141A", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "https://www.us-cert.gov/ncas/alerts/TA18-141A" }, { "name": "RHSA-2018:1656", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1656" }, { "name": "RHSA-2018:1664", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1664" }, { "name": "RHSA-2018:2258", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2258" }, { "name": "RHSA-2018:1688", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1688" }, { "name": "RHSA-2018:1658", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1658" }, { "name": "RHSA-2018:1657", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1657" }, { "name": "RHSA-2018:2289", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2289" }, { "name": "RHSA-2018:1666", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1666" }, { "name": "1042004", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1042004" }, { "name": "RHSA-2018:1675", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1675" }, { "name": "RHSA-2018:1660", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1660" }, { "name": "RHSA-2018:1965", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1965" }, { "name": "RHSA-2018:1661", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1661" }, { "name": "RHSA-2018:1633", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1633" }, { "name": "RHSA-2018:1636", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1636" }, { "name": "RHSA-2018:1854", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "name": "RHSA-2018:2006", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2006" }, { "name": "RHSA-2018:2250", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2250" }, { "name": "1040949", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040949" }, { "name": "RHSA-2018:3401", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3401" }, { "name": "RHSA-2018:1737", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1737" }, { "name": "RHSA-2018:1826", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1826" }, { "name": "USN-3651-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3651-1/" }, { "name": "DSA-4210", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4210" }, { "name": "44695", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/44695/" }, { "name": "RHSA-2018:1651", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1651" }, { "name": "RHSA-2018:1638", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1638" }, { "name": "RHSA-2018:1696", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1696" }, { "name": "RHSA-2018:2246", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2246" }, { "name": "RHSA-2018:1644", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1644" }, { "name": "RHSA-2018:1646", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1646" }, { "name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "name": "RHSA-2018:1639", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1639" }, { "name": "RHSA-2018:1668", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1668" }, { "name": "RHSA-2018:1637", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1637" }, { "name": "RHSA-2018:2948", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "name": "VU#180049", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "name": "RHSA-2018:1686", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1686" }, { "name": "RHSA-2018:2172", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2172" }, { "name": "RHSA-2018:1663", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1663" }, { "name": "USN-3652-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3652-1/" }, { "name": "RHSA-2018:1629", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1629" }, { "name": "RHSA-2018:1655", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1655" }, { "name": "RHSA-2018:1640", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1640" }, { "name": "RHSA-2018:1669", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1669" }, { "name": "RHSA-2018:1676", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1676" }, { "name": "20180522 CPU Side-Channel Information Disclosure Vulnerabilities: May 2018", "tags": [ "vendor-advisory", "x_refsource_CISCO" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel" }, { "name": "RHSA-2018:3425", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3425" }, { "name": "RHSA-2018:2363", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2363" }, { "name": "RHSA-2018:1632", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1632" }, { "name": "RHSA-2018:1650", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1650" }, { "name": "RHSA-2018:2396", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "name": "RHSA-2018:2364", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2364" }, { "name": "USN-3653-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3653-2/" }, { "name": "RHSA-2018:2216", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2216" }, { "name": "USN-3655-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3655-1/" }, { "name": "RHSA-2018:1649", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1649" }, { "name": "RHSA-2018:2309", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2309" }, { "name": "104232", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104232" }, { "name": "RHSA-2018:1653", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1653" }, { "name": "RHSA-2018:2171", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2171" }, { "name": "RHSA-2018:1635", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1635" }, { "name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "name": "RHSA-2018:2394", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "name": "RHSA-2018:1710", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1710" }, { "name": "RHSA-2018:1659", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1659" }, { "name": "RHSA-2018:1711", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1711" }, { "name": "DSA-4273", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "https://www.debian.org/security/2018/dsa-4273" }, { "name": "RHSA-2018:1738", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1738" }, { "name": "RHSA-2018:1674", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1674" }, { "name": "RHSA-2018:3396", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3396" }, { "name": "RHSA-2018:1667", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1667" }, { "name": "USN-3654-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3654-2/" }, { "name": "RHSA-2018:1662", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1662" }, { "name": "RHSA-2018:1630", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1630" }, { "name": "RHSA-2018:1647", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1647" }, { "name": "RHSA-2018:1967", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1967" }, { "name": "USN-3655-2", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3655-2/" }, { "name": "RHSA-2018:3399", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3399" }, { "name": "RHSA-2018:2060", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2060" }, { "name": "RHSA-2018:1690", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1690" }, { "name": "USN-3653-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3653-1/" }, { "name": "RHSA-2018:2161", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2161" }, { "name": "[debian-lts-announce] 20180727 [SECURITY] [DLA 1446-1] intel-microcode security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html" }, { "name": "RHSA-2018:2328", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2328" }, { "name": "RHSA-2018:1648", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1648" }, { "name": "RHSA-2018:2387", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "name": "RHSA-2019:0148", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:0148" }, { "name": "RHSA-2018:1654", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1654" }, { "name": "USN-3679-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3679-1/" }, { "name": "USN-3777-3", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3777-3/" }, { "name": "RHSA-2018:1642", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:1642" }, { "name": "RHSA-2018:3397", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3397" }, { "name": "[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html" }, { "name": "USN-3756-1", "tags": [ "vendor-advisory", "x_refsource_UBUNTU" ], "url": "https://usn.ubuntu.com/3756-1/" }, { "name": "RHSA-2018:3398", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3398" }, { "name": "RHSA-2018:3400", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:3400" }, { "name": "RHSA-2018:2228", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2018:2228" }, { "name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "name": "RHSA-2019:1046", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "https://access.redhat.com/errata/RHSA-2019:1046" }, { "name": "openSUSE-SU-2019:1439", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" }, { "name": "openSUSE-SU-2019:1438", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html" }, { "name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "name": "[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/10/1" }, { "name": "[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/10/2" }, { "name": "[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768", "tags": [ "mailing-list", "x_refsource_MLIST" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/10/5" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://support.lenovo.com/us/en/solutions/LEN-22133" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX235225" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_18_23" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://xenbits.xen.org/xsa/advisory-263.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03850en_us" }, { "tags": [ "x_refsource_MISC" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20180521-0001/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html" }, { "name": "openSUSE-SU-2020:1325", "tags": [ "vendor-advisory", "x_refsource_SUSE" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2018-05-21T00:00:00", "ID": "CVE-2018-3639", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Multiple", "version": { "version_data": [ { "version_value": "Multiple" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information Disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "RHSA-2018:1689", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1689" }, { "name": "RHSA-2018:2162", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2162" }, { "name": "RHSA-2018:1641", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1641" }, { "name": "USN-3680-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3680-1/" }, { "name": "RHSA-2018:1997", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1997" }, { "name": "RHSA-2018:1665", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1665" }, { "name": "RHSA-2018:3407", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3407" }, { "name": "RHSA-2018:2164", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2164" }, { "name": "RHSA-2018:2001", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2001" }, { "name": "RHSA-2018:3423", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3423" }, { "name": "RHSA-2018:2003", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2003" }, { "name": "USN-3654-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3654-1/" }, { "name": "RHSA-2018:1645", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1645" }, { "name": "RHSA-2018:1643", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1643" }, { "name": "RHSA-2018:1652", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1652" }, { "name": "RHSA-2018:3424", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3424" }, { "name": "RHSA-2018:3402", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3402" }, { "name": "TA18-141A", "refsource": "CERT", "url": "https://www.us-cert.gov/ncas/alerts/TA18-141A" }, { "name": "RHSA-2018:1656", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1656" }, { "name": "RHSA-2018:1664", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1664" }, { "name": "RHSA-2018:2258", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2258" }, { "name": "RHSA-2018:1688", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1688" }, { "name": "RHSA-2018:1658", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1658" }, { "name": "RHSA-2018:1657", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1657" }, { "name": "RHSA-2018:2289", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2289" }, { "name": "RHSA-2018:1666", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1666" }, { "name": "1042004", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1042004" }, { "name": "RHSA-2018:1675", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1675" }, { "name": "RHSA-2018:1660", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1660" }, { "name": "RHSA-2018:1965", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1965" }, { "name": "RHSA-2018:1661", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1661" }, { "name": "RHSA-2018:1633", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1633" }, { "name": "RHSA-2018:1636", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1636" }, { "name": "RHSA-2018:1854", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "name": "RHSA-2018:2006", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2006" }, { "name": "RHSA-2018:2250", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2250" }, { "name": "1040949", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040949" }, { "name": "RHSA-2018:3401", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3401" }, { "name": "RHSA-2018:1737", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1737" }, { "name": "RHSA-2018:1826", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1826" }, { "name": "USN-3651-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3651-1/" }, { "name": "DSA-4210", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4210" }, { "name": "44695", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/44695/" }, { "name": "RHSA-2018:1651", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1651" }, { "name": "RHSA-2018:1638", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1638" }, { "name": "RHSA-2018:1696", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1696" }, { "name": "RHSA-2018:2246", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2246" }, { "name": "RHSA-2018:1644", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1644" }, { "name": "RHSA-2018:1646", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1646" }, { "name": "[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "name": "RHSA-2018:1639", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1639" }, { "name": "RHSA-2018:1668", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1668" }, { "name": "RHSA-2018:1637", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1637" }, { "name": "RHSA-2018:2948", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "name": "VU#180049", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/180049" }, { "name": "RHSA-2018:1686", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1686" }, { "name": "RHSA-2018:2172", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2172" }, { "name": "RHSA-2018:1663", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1663" }, { "name": "USN-3652-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3652-1/" }, { "name": "RHSA-2018:1629", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1629" }, { "name": "RHSA-2018:1655", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1655" }, { "name": "RHSA-2018:1640", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1640" }, { "name": "RHSA-2018:1669", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1669" }, { "name": "RHSA-2018:1676", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1676" }, { "name": "20180522 CPU Side-Channel Information Disclosure Vulnerabilities: May 2018", "refsource": "CISCO", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel" }, { "name": "RHSA-2018:3425", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3425" }, { "name": "RHSA-2018:2363", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2363" }, { "name": "RHSA-2018:1632", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1632" }, { "name": "RHSA-2018:1650", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1650" }, { "name": "RHSA-2018:2396", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "name": "RHSA-2018:2364", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2364" }, { "name": "USN-3653-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3653-2/" }, { "name": "RHSA-2018:2216", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2216" }, { "name": "USN-3655-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3655-1/" }, { "name": "RHSA-2018:1649", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1649" }, { "name": "RHSA-2018:2309", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2309" }, { "name": "104232", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104232" }, { "name": "RHSA-2018:1653", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1653" }, { "name": "RHSA-2018:2171", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2171" }, { "name": "RHSA-2018:1635", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1635" }, { "name": "[debian-lts-announce] 20180916 [SECURITY] [DLA 1506-1] intel-microcode security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "name": "RHSA-2018:2394", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "name": "RHSA-2018:1710", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1710" }, { "name": "RHSA-2018:1659", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1659" }, { "name": "RHSA-2018:1711", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1711" }, { "name": "DSA-4273", "refsource": "DEBIAN", "url": "https://www.debian.org/security/2018/dsa-4273" }, { "name": "RHSA-2018:1738", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1738" }, { "name": "RHSA-2018:1674", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1674" }, { "name": "RHSA-2018:3396", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3396" }, { "name": "RHSA-2018:1667", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1667" }, { "name": "USN-3654-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3654-2/" }, { "name": "RHSA-2018:1662", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1662" }, { "name": "RHSA-2018:1630", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1630" }, { "name": "RHSA-2018:1647", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1647" }, { "name": "RHSA-2018:1967", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1967" }, { "name": "USN-3655-2", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3655-2/" }, { "name": "RHSA-2018:3399", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3399" }, { "name": "RHSA-2018:2060", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2060" }, { "name": "RHSA-2018:1690", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1690" }, { "name": "USN-3653-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3653-1/" }, { "name": "RHSA-2018:2161", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2161" }, { "name": "[debian-lts-announce] 20180727 [SECURITY] [DLA 1446-1] intel-microcode security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html" }, { "name": "RHSA-2018:2328", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2328" }, { "name": "RHSA-2018:1648", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1648" }, { "name": "RHSA-2018:2387", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "name": "RHSA-2019:0148", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:0148" }, { "name": "RHSA-2018:1654", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1654" }, { "name": "USN-3679-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3679-1/" }, { "name": "USN-3777-3", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3777-3/" }, { "name": "RHSA-2018:1642", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:1642" }, { "name": "RHSA-2018:3397", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3397" }, { "name": "[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html" }, { "name": "USN-3756-1", "refsource": "UBUNTU", "url": "https://usn.ubuntu.com/3756-1/" }, { "name": "RHSA-2018:3398", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3398" }, { "name": "RHSA-2018:3400", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:3400" }, { "name": "RHSA-2018:2228", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2018:2228" }, { "name": "[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "name": "[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "name": "RHSA-2019:1046", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2019:1046" }, { "name": "openSUSE-SU-2019:1439", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" }, { "name": "openSUSE-SU-2019:1438", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html" }, { "name": "20190624 [SECURITY] [DSA 4469-1] libvirt security update", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "name": "[oss-security] 20200610 kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/06/10/1" }, { "name": "[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/06/10/2" }, { "name": "[oss-security] 20200610 Re: kernel: Multiple SSBD related flaws CVE-2020-10766 , CVE-2020-10767, CVE-2020-10768", "refsource": "MLIST", "url": "http://www.openwall.com/lists/oss-security/2020/06/10/5" }, { "name": "https://www.oracle.com/security-alerts/cpujul2020.html", "refsource": "MISC", "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "name": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html", "refsource": "CONFIRM", "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "name": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0", "refsource": "CONFIRM", "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf" }, { "name": "http://support.lenovo.com/us/en/solutions/LEN-22133", "refsource": "CONFIRM", "url": "http://support.lenovo.com/us/en/solutions/LEN-22133" }, { "name": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004", "refsource": "CONFIRM", "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004" }, { "name": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012", "refsource": "CONFIRM", "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012" }, { "name": "https://support.citrix.com/article/CTX235225", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX235225" }, { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_23", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_18_23" }, { "name": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability", "refsource": "CONFIRM", "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "name": "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html", "refsource": "CONFIRM", "url": "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html" }, { "name": "http://xenbits.xen.org/xsa/advisory-263.html", "refsource": "CONFIRM", "url": "http://xenbits.xen.org/xsa/advisory-263.html" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "name": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006", "refsource": "CONFIRM", "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006" }, { "name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03850en_us", "refsource": "CONFIRM", "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03850en_us" }, { "name": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528", "refsource": "MISC", "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "name": "https://security.netapp.com/advisory/ntap-20180521-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20180521-0001/" }, { "name": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787", "refsource": "CONFIRM", "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787" }, { "name": "https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html", "refsource": "CONFIRM", "url": "https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html" }, { "name": "openSUSE-SU-2020:1325", "refsource": "SUSE", "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2018-3639", "datePublished": "2018-05-22T12:00:00Z", "dateReserved": "2017-12-28T00:00:00", "dateUpdated": "2024-09-16T22:55:27.557Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-41838
Vulnerability from cvelistv5
Published
2022-02-03 01:43
Modified
2024-08-04 03:22
Severity ?
EPSS score ?
Summary
An issue was discovered in SdHostDriver in the kernel 5.0 through 5.5 in Insyde InsydeH2O. There is an SMM callout that allows an attacker to access the System Management Mode and execute arbitrary code. This occurs because of a Numeric Range Comparison Without a Minimum Check.
References
▼ | URL | Tags |
---|---|---|
https://www.insyde.com/security-pledge | x_refsource_MISC | |
https://www.insyde.com/security-pledge/SA-2022023 | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20220222-0001/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T03:22:24.937Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.insyde.com/security-pledge" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.insyde.com/security-pledge/SA-2022023" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0001/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "An issue was discovered in SdHostDriver in the kernel 5.0 through 5.5 in Insyde InsydeH2O. There is an SMM callout that allows an attacker to access the System Management Mode and execute arbitrary code. This occurs because of a Numeric Range Comparison Without a Minimum Check." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-23T15:06:23", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.insyde.com/security-pledge" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.insyde.com/security-pledge/SA-2022023" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0001/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-41838", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An issue was discovered in SdHostDriver in the kernel 5.0 through 5.5 in Insyde InsydeH2O. There is an SMM callout that allows an attacker to access the System Management Mode and execute arbitrary code. This occurs because of a Numeric Range Comparison Without a Minimum Check." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.insyde.com/security-pledge", "refsource": "MISC", "url": "https://www.insyde.com/security-pledge" }, { "name": "https://www.insyde.com/security-pledge/SA-2022023", "refsource": "MISC", "url": "https://www.insyde.com/security-pledge/SA-2022023" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "name": "https://security.netapp.com/advisory/ntap-20220222-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220222-0001/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-41838", "datePublished": "2022-02-03T01:43:30", "dateReserved": "2021-10-01T00:00:00", "dateUpdated": "2024-08-04T03:22:24.937Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-5953
Vulnerability from cvelistv5
Published
2022-02-03 01:00
Modified
2024-08-04 08:47
Severity ?
EPSS score ?
Summary
A vulnerability exists in System Management Interrupt (SWSMI) handler of InsydeH2O UEFI Firmware code located in SWSMI handler that dereferences gRT (EFI_RUNTIME_SERVICES) pointer to call a GetVariable service, which is located outside of SMRAM. This can result in code execution in SMM (escalating privilege from ring 0 to ring -2).
References
▼ | URL | Tags |
---|---|---|
https://www.insyde.com/products | x_refsource_MISC | |
https://www.insyde.com/security-pledge | x_refsource_MISC | |
https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20220222-0005/ | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:47:41.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.insyde.com/products" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.insyde.com/security-pledge" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0005/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability exists in System Management Interrupt (SWSMI) handler of InsydeH2O UEFI Firmware code located in SWSMI handler that dereferences gRT (EFI_RUNTIME_SERVICES) pointer to call a GetVariable service, which is located outside of SMRAM. This can result in code execution in SMM (escalating privilege from ring 0 to ring -2)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-23T15:06:21", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.insyde.com/products" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.insyde.com/security-pledge" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0005/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2020-5953", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability exists in System Management Interrupt (SWSMI) handler of InsydeH2O UEFI Firmware code located in SWSMI handler that dereferences gRT (EFI_RUNTIME_SERVICES) pointer to call a GetVariable service, which is located outside of SMRAM. This can result in code execution in SMM (escalating privilege from ring 0 to ring -2)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.insyde.com/products", "refsource": "MISC", "url": "https://www.insyde.com/products" }, { "name": "https://www.insyde.com/security-pledge", "refsource": "MISC", "url": "https://www.insyde.com/security-pledge" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "name": "https://security.netapp.com/advisory/ntap-20220222-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220222-0005/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2020-5953", "datePublished": "2022-02-03T01:00:57", "dateReserved": "2020-01-06T00:00:00", "dateUpdated": "2024-08-04T08:47:41.026Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-24507
Vulnerability from cvelistv5
Published
2021-06-09 18:47
Modified
2024-08-04 15:12
Severity ?
EPSS score ?
Summary
Improper initialization in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, 13.50.11 and 15.0.22 may allow a privileged user to potentially enable information disclosure via local access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20210611-0004/ | x_refsource_CONFIRM | |
https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) CSME versions |
Version: versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, 13.50.11 and 15.0.22 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T15:12:09.009Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0004/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) CSME versions", "vendor": "n/a", "versions": [ { "status": "affected", "version": "versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, 13.50.11 and 15.0.22" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper initialization in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, 13.50.11 and 15.0.22 may allow a privileged user to potentially enable information disclosure via local access." } ], "problemTypes": [ { "descriptions": [ { "description": "information disclosure", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-08-10T11:06:27", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0004/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-24507", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) CSME versions", "version": { "version_data": [ { "version_value": "versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, 13.50.11 and 15.0.22" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper initialization in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, 13.50.11 and 15.0.22 may allow a privileged user to potentially enable information disclosure via local access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "information disclosure" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html" }, { "name": "https://security.netapp.com/advisory/ntap-20210611-0004/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20210611-0004/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-24507", "datePublished": "2021-06-09T18:47:46", "dateReserved": "2020-08-19T00:00:00", "dateUpdated": "2024-08-04T15:12:09.009Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-33626
Vulnerability from cvelistv5
Published
2021-10-01 02:21
Modified
2024-08-03 23:58
Severity ?
EPSS score ?
Summary
A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution.
References
▼ | URL | Tags |
---|---|---|
https://www.insyde.com/security-pledge | x_refsource_MISC | |
https://www.insyde.com/security-pledge/SA-2021001 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20220216-0006/ | x_refsource_CONFIRM | |
https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | x_refsource_CONFIRM |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T23:58:21.523Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.insyde.com/security-pledge" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.insyde.com/security-pledge/SA-2021001" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20220216-0006/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-02-22T19:07:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.insyde.com/security-pledge" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.insyde.com/security-pledge/SA-2021001" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20220216-0006/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ], "source": { "discovery": "INTERNAL" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2021-33626", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.insyde.com/security-pledge", "refsource": "MISC", "url": "https://www.insyde.com/security-pledge" }, { "name": "https://www.insyde.com/security-pledge/SA-2021001", "refsource": "MISC", "url": "https://www.insyde.com/security-pledge/SA-2021001" }, { "name": "https://security.netapp.com/advisory/ntap-20220216-0006/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20220216-0006/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" } ] }, "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2021-33626", "datePublished": "2021-10-01T02:21:29", "dateReserved": "2021-05-28T00:00:00", "dateUpdated": "2024-08-03T23:58:21.523Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-5712
Vulnerability from cvelistv5
Published
2017-11-21 14:00
Modified
2024-09-16 23:21
Severity ?
EPSS score ?
Summary
Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege.
References
▼ | URL | Tags |
---|---|---|
https://security.netapp.com/advisory/ntap-20171120-0001/ | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039852 | vdb-entry, x_refsource_SECTRACK | |
https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086&languageid=en-fr | x_refsource_CONFIRM | |
http://www.securityfocus.com/bid/101920 | vdb-entry, x_refsource_BID | |
https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf | x_refsource_CONFIRM | |
https://www.asus.com/News/wzeltG5CjYaIwGJ0 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Intel Corporation | Active Management Technology |
Version: 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:11:48.603Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "name": "1039852", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039852" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "name": "101920", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/101920" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Active Management Technology", "vendor": "Intel Corporation", "versions": [ { "status": "affected", "version": "8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20" } ] } ], "datePublic": "2017-11-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege." } ], "problemTypes": [ { "descriptions": [ { "description": "Elevation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-10T09:57:01", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "name": "1039852", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039852" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "name": "101920", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/101920" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "DATE_PUBLIC": "2017-11-20T00:00:00", "ID": "CVE-2017-5712", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Active Management Technology", "version": { "version_data": [ { "version_value": "8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20" } ] } } ] }, "vendor_name": "Intel Corporation" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Elevation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.netapp.com/advisory/ntap-20171120-0001/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "name": "1039852", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039852" }, { "name": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr", "refsource": "CONFIRM", "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "name": "101920", "refsource": "BID", "url": "http://www.securityfocus.com/bid/101920" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "name": "https://www.asus.com/News/wzeltG5CjYaIwGJ0", "refsource": "CONFIRM", "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2017-5712", "datePublished": "2017-11-21T14:00:00Z", "dateReserved": "2017-02-01T00:00:00", "dateUpdated": "2024-09-16T23:21:05.833Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-8745
Vulnerability from cvelistv5
Published
2020-11-12 18:06
Modified
2024-08-04 10:12
Severity ?
EPSS score ?
Summary
Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | x_refsource_MISC | |
https://security.netapp.com/advisory/ntap-20201113-0005/ | x_refsource_CONFIRM | |
https://security.netapp.com/advisory/ntap-20201113-0002/ | x_refsource_CONFIRM | |
https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Intel(R) CSME, Intel(R) TXE |
Version: Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T10:12:09.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0005/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0002/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel(R) CSME, Intel(R) TXE", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30" } ] } ], "descriptions": [ { "lang": "en", "value": "Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access." } ], "problemTypes": [ { "descriptions": [ { "description": "escalation of privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-05-11T12:06:31", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0005/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0002/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-8745", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel(R) CSME, Intel(R) TXE", "version": { "version_data": [ { "version_value": "Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "escalation of privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391", "refsource": "MISC", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "name": "https://security.netapp.com/advisory/ntap-20201113-0005/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201113-0005/" }, { "name": "https://security.netapp.com/advisory/ntap-20201113-0002/", "refsource": "CONFIRM", "url": "https://security.netapp.com/advisory/ntap-20201113-0002/" }, { "name": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf", "refsource": "CONFIRM", "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-8745", "datePublished": "2020-11-12T18:06:09", "dateReserved": "2020-02-06T00:00:00", "dateUpdated": "2024-08-04T10:12:09.559Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2022-02-03 02:15
Modified
2024-11-21 06:27
Severity ?
Summary
An issue was discovered in Insyde InsydeH2O with Kernel 5.0 before 05.08.42, Kernel 5.1 before 05.16.42, Kernel 5.2 before 05.26.42, Kernel 5.3 before 05.35.42, Kernel 5.4 before 05.42.51, and Kernel 5.5 before 05.50.51. An SMM memory corruption vulnerability in FvbServicesRuntimeDxe allows a possible attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20220216-0007/ | Third Party Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge | Vendor Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge/SA-2022012 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20220216-0007/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge/SA-2022012 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0BA9E3E-930F-4EE7-B652-8746B2E3D7EE", "versionEndExcluding": "5.08.42", "versionStartIncluding": "5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4803E0A-D93A-4863-B9F6-378C3D73F743", "versionEndExcluding": "5.16.42", "versionStartIncluding": "5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "65D09B40-7B64-4890-AEA5-AE1EB5201CA1", "versionEndExcluding": "5.26.42", "versionStartIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "E38FAADD-CEC5-421F-BBD7-1152B95B2A10", "versionEndExcluding": "5.35.42", "versionStartIncluding": "5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "5536AD0D-EE19-41C7-BC57-69EAF77D6E8C", "versionEndExcluding": "5.42.51", "versionStartIncluding": "5.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "C140942E-1DC5-4491-8BB6-7FF6960A216D", "versionEndExcluding": "5.50.51", "versionStartIncluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "324ADC7E-AECD-4B7D-8571-5399542C2BF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "480C5657-5C05-40F5-B76A-E67119727ED8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AEB5AD1-3973-4150-BEA2-C9DE0B98222F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F63C0B17-60E2-4240-92FD-4B7C7D8F2C8B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc227g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3F52F29-0ACF-4ECC-927A-0CB27399E5D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D1E85AC-1305-4C5E-AD8B-39B2654F6057", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc277g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F203C449-2B5C-47A1-BF3D-8DCFD29F0B18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*", "matchCriteriaId": "320F5752-86B3-4C08-89D0-02272753A6D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc327g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A37FB5EC-BB64-472C-81FC-8EEF238E3C12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC7303D1-CC95-42C7-B843-C3B3B3336669", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc377g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45013BCA-3897-4D58-81FA-D8CB9D19268C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDD6F034-BC50-4223-AE5D-319F04C866A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6422BF3-01B7-443B-BD2B-80E45D7C3F5F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "696F47E6-C1CA-4A58-A91F-4B3EA92954AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F712060C-ECDB-4BC7-B9B9-468B41DE615B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D511C170-65E5-416D-B7CE-557A503F25AE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "577C19F5-82ED-46DF-91CC-A074DE99EBDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEF4592C-5DB3-45F4-B354-59701BBA0C08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87F0538B-ED6E-40C7-9C2A-4C5DC3D2935E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ruggedcom_ape1808_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "ABE0A54C-AEB3-4B1D-AD5D-F9239709B052", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ruggedcom_ape1808:-:*:*:*:*:*:*:*", "matchCriteriaId": "B89A6863-B602-4404-8D26-337FECABFFF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Insyde InsydeH2O with Kernel 5.0 before 05.08.42, Kernel 5.1 before 05.16.42, Kernel 5.2 before 05.26.42, Kernel 5.3 before 05.35.42, Kernel 5.4 before 05.42.51, and Kernel 5.5 before 05.50.51. An SMM memory corruption vulnerability in FvbServicesRuntimeDxe allows a possible attacker to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM." }, { "lang": "es", "value": "Se ha descubierto un problema en InsydeH2O con el Kernel versi\u00f3n 5.0 antes de 05.08.42, el Kernel 5.1 antes de 05.16.42, el Kernel versi\u00f3n 5.2 antes de 05.26.42, el Kernel versi\u00f3n 5.3 antes de 05.35.42, el Kernel versi\u00f3n 5.4 antes de 05.42.51 y el Kernel versi\u00f3n 5.5 antes de 05.50.51. Una vulnerabilidad de corrupci\u00f3n de memoria SMM en FvbServicesRuntimeDxe permite a un posible atacante escribir datos fijos o predecibles en la SMRAM. La explotaci\u00f3n de este problema podr\u00eda llevar a escalar privilegios a SMM." } ], "id": "CVE-2021-42554", "lastModified": "2024-11-21T06:27:47.840", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-03T02:15:07.380", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220216-0007/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2022012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220216-0007/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2022012" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-09 19:15
Modified
2024-11-21 05:14
Severity ?
Summary
Improper initialization in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, 13.50.11 and 15.0.22 may allow a privileged user to potentially enable information disclosure via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D41935E-7A95-4D3A-AC89-9FB81BF18AC0", "versionEndExcluding": "12.0.81", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:b360:-:*:*:*:*:*:*:*", "matchCriteriaId": "0829C549-51C2-4029-9623-51D0C5470FBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:b365:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CC7A911-2CFA-44B3-9B5D-824C02A92D1C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7FDE41F-FF2A-42F0-AF4D-F57A28E377F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AB420EA-D647-4272-8A96-2A09E70FAEAE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6910BDD0-4968-45AE-AD19-3A1206F5D068", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*", "matchCriteriaId": "14C91CFB-C318-4F06-9A01-DCCEE2E901B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5C0F89F-0C58-44B8-A02C-50A97B086659", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*", "matchCriteriaId": "70EAC725-DC8A-4DA9-8B01-0465EBE86D6E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*", "matchCriteriaId": "25227F52-7398-4E68-A973-B9177886BE0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "B230FB82-C498-4118-97D3-3835CB713E87", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A205DBD9-A841-446A-8ED8-57989B806518", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFEF82DB-59F7-4530-B3CC-3D417CD519B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*", "matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*", "matchCriteriaId": "73DA1253-1652-417A-BE27-586EF8ED59F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "790A7B55-AD96-4B1C-A31A-C6778BFD5CC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*", "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h310:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DD64A3C-6925-4715-9D55-F1FC8AA0BB95", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h370:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7D83701-E7FF-41D3-ACC6-C78519E34FBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:mobile_cm246:-:*:*:*:*:*:*:*", "matchCriteriaId": "6574448C-E901-4E96-AC27-51ED5514E15F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B485AC9-B986-4100-90CC-E4BC9B1AAFD1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F76BE235-C991-43BB-B145-239D95084BC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6748F85C-A99A-4380-B01A-A51DBD43AED9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*", "matchCriteriaId": "421F0AF2-5F41-4F0C-A909-D76D72AB5FCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C04332C1-9652-44ED-BD97-5A6AD0A4E6B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D376C32-99BE-4DF4-A63D-2156D10EEA73", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE118AB2-A2C4-452C-B9AD-DDEF65B5EC67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA0D6C21-7DCE-4F8C-9394-D0006695550D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD6B51B5-96AA-44C8-9539-9D7F67143DC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB78854-1E03-48F3-BC86-B0934641B47E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D3350F-8083-4FD3-9432-36C10EE911EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB28789-A195-4EB8-AE96-6E1EFEE93E6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C96A17A-44EE-4FD0-9187-9BB9202AA9C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D6425C6-A338-42A0-B236-12B33147931D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF3F6453-51EF-4509-94CB-24E8ECFBAC5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4861FF06-6720-4E5A-B599-F7F96D7D4FE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF098E89-4979-45DB-AF4C-A5D0F5CE6F67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "A263FA56-5F1F-4E91-A354-38648E130685", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*", "matchCriteriaId": "102AFB09-B4EC-456C-899A-A9ABDA120D54", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D24E8214-881A-4C15-A544-FB3FD5D14DCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*", "matchCriteriaId": "02454A49-0345-4927-89DF-7A37C25E4E11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1EDE72E-3734-4FB5-BC77-B7C3838D41F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E07450B-D81B-474D-9150-C9D8A62D44A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A892B60-7FD3-41A6-9997-586B76757416", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4701D592-F06C-4713-9736-19DB130B5E2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3E6063A-23C9-4845-B575-5D330B6C68F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D50C73A4-D52E-4560-B725-61F416E18505", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "25570E2C-BBE9-402F-9631-FA5014767CE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*", "matchCriteriaId": "D59D57C2-CFB5-486E-A340-E63C7D7A8B6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q370:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CD6D64A-BC68-458E-810B-9EEDFD35817A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*", "matchCriteriaId": "853DE44A-84C9-4959-865F-D538DF895647", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*", "matchCriteriaId": "13326C69-C160-482F-BF28-5425B57BE738", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07040D2-2ADC-4CC4-860F-74A7C64FD6FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F66D2E5-BD5B-406D-82A0-4E1E32EDC337", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*", "matchCriteriaId": "557E240A-6760-434E-9C3A-1E5E9129912D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D196C46-0F17-4C42-A232-B12CE85D9641", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B7565F3-5D41-4A1F-948B-1A55E3AD3EF8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3B40170-C992-4386-8429-52A216F64384", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*", "matchCriteriaId": "C71A52C1-1FBF-4730-8234-700F87D5E74D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9219B34E-F94C-4ECA-85E5-850EBD0F41A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B930DF9-C425-41AF-9736-0BD611C79CA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCD02FD9-8E63-4B79-8878-07C4316981C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DF260A0-CDD8-4EE1-B3F4-73CD02FDCD11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B84F7DC-EE67-4748-8AE2-7070A6F79BAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C156433-48A3-4B2E-A8DB-AF1F09B2EFA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D78A1CFF-F05E-429C-A9AA-935078574A3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE28AD41-2287-4F2B-924C-30B66A320443", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD09C370-3A22-4AFD-89D7-C35B152C4DE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:z390:-:*:*:*:*:*:*:*", "matchCriteriaId": "9379A170-4752-49F2-941D-75D88D385966", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "820A8ADD-5177-4EEB-BB28-79C9A0F519B9", "versionEndExcluding": "13.0.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E40B89C2-49CD-4216-9D4C-79695698EAAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F751905-287E-47EA-93B8-2BA576052AAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*", "matchCriteriaId": "614B1B4E-E1D7-417F-86D1-92F75D597E36", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BD11E86-B786-43C8-9B67-8F680CC30451", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D740D69-83B6-4DBF-8617-9B1E96DFF4FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9963C9F-2D15-479A-A6C1-0C9863904B7E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8B15567-BFEA-43BE-9817-98A1F5548541", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*", "matchCriteriaId": "984C7C7A-2F8E-4918-8526-64A080943E0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", "matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*", "matchCriteriaId": "43454510-4BE7-4CD1-960D-AE1B36EFBEA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7AFC285-2248-45E7-9009-1402628F17E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "078DAE1F-8581-44FB-83EA-575685928C4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*", "matchCriteriaId": "887BEC29-AD0D-4BEB-B50B-F961629BBF23", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*", "matchCriteriaId": "93859A03-DE41-4E7B-8646-93925ACBFC42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*", "matchCriteriaId": "9877F278-641B-4F83-B420-AB4E1018EA9E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "403E8A3A-28C2-4329-BF31-1A530E317959", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "7824FB5D-4401-4785-BD6D-4A8E67434217", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6F3DE58-EC72-429F-A223-F2027D2828AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E6B9500-2C37-48D5-A0BA-A159D04AC6CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BF497A0-30BC-42A4-A000-C0D564D4872A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3025301-52D3-43D7-B6AB-F3F0A5C882DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9466A6CC-8D69-4EB5-94E2-611297120462", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2D116C4-698B-45BC-8622-87E142B37922", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AFE4FE7-AA7E-425E-AF51-2FCB3E4E6C11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DCA6E61-F1C9-4629-9068-545B19CF95E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "36836EB0-99DD-4217-9182-1E9FC5656C42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD507601-CD6D-4F11-A4A7-790FB740B401", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C26205-C602-46F6-B611-424709325D6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "464587A0-9EAA-4DF5-AFEB-15F2FA9CD407", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "1940F59A-67FD-45F9-9C78-51A50687628F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B722E2A-1262-44FD-8F7C-F9A9A5C78744", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BC3C45C-FACC-4890-992F-449DF6F06E11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA08C262-414E-401A-8F91-131626FA82A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1978F85-5BA5-468E-B797-7FA7EB4F489D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8D3D0CA-C981-4091-99F9-203DA8F156F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB23D0C-D2BC-4E7F-94AF-CAF171A64307", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CC9312B-40A7-4D4A-A61C-3BA865C29F63", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EBECBE5-2BF0-4175-81CC-C6D054C819B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB33CC4F-9D51-4A11-B063-6E78F0D71555", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", "matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", "matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", "matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*", "matchCriteriaId": "39F9F143-0AB4-4302-82B8-B4EA790EB08D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE73B0A0-E275-449D-8ADD-86AE188DE82A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE06C64A-1610-4340-98CF-AC91258AB215", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*", "matchCriteriaId": "C27F79F3-EA0A-429C-8DA9-BC276A94AFB7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*", "matchCriteriaId": "B07609EB-E10B-4253-938E-81566036D81B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC44D69-AAAB-4524-9D12-F1A606D57831", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D23D2887-1246-4EA4-B8B6-57BC7FB869E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEFC46D5-B23D-4513-9669-4DC53662F87B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52310FF-8235-4081-B679-CA56C0361B1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D264277-00CB-4FCC-ADAA-38536609D0F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FF33336-6175-417A-B0E0-F50BD7F9705B", "versionEndExcluding": "13.30.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3_l13g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "024630A7-07FD-4FCD-8F1C-8416BD4BE48A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5_l16g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CBFEB46-F34E-4A5B-BC67-9248C777EB7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "55D4F5A0-E660-4D21-8F13-B857F6AEAA05", "versionEndExcluding": "14.1.53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFB47F1D-AE3D-4F0E-AEFE-879140B47DD5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E40B89C2-49CD-4216-9D4C-79695698EAAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F751905-287E-47EA-93B8-2BA576052AAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*", "matchCriteriaId": "614B1B4E-E1D7-417F-86D1-92F75D597E36", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BD11E86-B786-43C8-9B67-8F680CC30451", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D740D69-83B6-4DBF-8617-9B1E96DFF4FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9963C9F-2D15-479A-A6C1-0C9863904B7E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8B15567-BFEA-43BE-9817-98A1F5548541", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*", "matchCriteriaId": "984C7C7A-2F8E-4918-8526-64A080943E0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", "matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*", "matchCriteriaId": "43454510-4BE7-4CD1-960D-AE1B36EFBEA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7AFC285-2248-45E7-9009-1402628F17E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "078DAE1F-8581-44FB-83EA-575685928C4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*", "matchCriteriaId": "887BEC29-AD0D-4BEB-B50B-F961629BBF23", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*", "matchCriteriaId": "93859A03-DE41-4E7B-8646-93925ACBFC42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*", "matchCriteriaId": "9877F278-641B-4F83-B420-AB4E1018EA9E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "403E8A3A-28C2-4329-BF31-1A530E317959", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "7824FB5D-4401-4785-BD6D-4A8E67434217", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6F3DE58-EC72-429F-A223-F2027D2828AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E6B9500-2C37-48D5-A0BA-A159D04AC6CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BF497A0-30BC-42A4-A000-C0D564D4872A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3025301-52D3-43D7-B6AB-F3F0A5C882DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9466A6CC-8D69-4EB5-94E2-611297120462", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2D116C4-698B-45BC-8622-87E142B37922", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AFE4FE7-AA7E-425E-AF51-2FCB3E4E6C11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DCA6E61-F1C9-4629-9068-545B19CF95E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "36836EB0-99DD-4217-9182-1E9FC5656C42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD507601-CD6D-4F11-A4A7-790FB740B401", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C26205-C602-46F6-B611-424709325D6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "464587A0-9EAA-4DF5-AFEB-15F2FA9CD407", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "1940F59A-67FD-45F9-9C78-51A50687628F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B722E2A-1262-44FD-8F7C-F9A9A5C78744", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BC3C45C-FACC-4890-992F-449DF6F06E11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA08C262-414E-401A-8F91-131626FA82A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1978F85-5BA5-468E-B797-7FA7EB4F489D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8D3D0CA-C981-4091-99F9-203DA8F156F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB23D0C-D2BC-4E7F-94AF-CAF171A64307", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CC9312B-40A7-4D4A-A61C-3BA865C29F63", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EBECBE5-2BF0-4175-81CC-C6D054C819B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB33CC4F-9D51-4A11-B063-6E78F0D71555", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", "matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", "matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", "matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*", "matchCriteriaId": "39F9F143-0AB4-4302-82B8-B4EA790EB08D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE73B0A0-E275-449D-8ADD-86AE188DE82A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE06C64A-1610-4340-98CF-AC91258AB215", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*", "matchCriteriaId": "C27F79F3-EA0A-429C-8DA9-BC276A94AFB7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*", "matchCriteriaId": "B07609EB-E10B-4253-938E-81566036D81B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC44D69-AAAB-4524-9D12-F1A606D57831", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D23D2887-1246-4EA4-B8B6-57BC7FB869E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEFC46D5-B23D-4513-9669-4DC53662F87B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52310FF-8235-4081-B679-CA56C0361B1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D264277-00CB-4FCC-ADAA-38536609D0F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE191F8B-AC43-431E-87F7-46E2EF211D27", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*", "matchCriteriaId": "C530D5AA-7480-45A7-BF06-45BF95B96B22", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D7E83B0-4902-40CF-9B24-3358846186E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*", "matchCriteriaId": "61E425A8-F0F9-4C38-B199-0A410F0D0270", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F945B90-257C-4DCB-9CB3-F34C6F6529D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5AE97F1-0236-4305-BC0B-253160262125", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*", "matchCriteriaId": "8621ECA8-A467-471E-A871-72EDD10BB2FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*", "matchCriteriaId": "D16ACC77-CE53-4897-BEF8-50CFE7AD56FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFD9933D-824D-4351-9E9C-26EA987AAFA8", "versionEndExcluding": "14.5.32", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B485AC9-B986-4100-90CC-E4BC9B1AAFD1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F76BE235-C991-43BB-B145-239D95084BC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6748F85C-A99A-4380-B01A-A51DBD43AED9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*", "matchCriteriaId": "421F0AF2-5F41-4F0C-A909-D76D72AB5FCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C04332C1-9652-44ED-BD97-5A6AD0A4E6B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D376C32-99BE-4DF4-A63D-2156D10EEA73", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE118AB2-A2C4-452C-B9AD-DDEF65B5EC67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA0D6C21-7DCE-4F8C-9394-D0006695550D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD6B51B5-96AA-44C8-9539-9D7F67143DC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB78854-1E03-48F3-BC86-B0934641B47E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D3350F-8083-4FD3-9432-36C10EE911EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB28789-A195-4EB8-AE96-6E1EFEE93E6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C96A17A-44EE-4FD0-9187-9BB9202AA9C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D6425C6-A338-42A0-B236-12B33147931D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF3F6453-51EF-4509-94CB-24E8ECFBAC5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4861FF06-6720-4E5A-B599-F7F96D7D4FE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF098E89-4979-45DB-AF4C-A5D0F5CE6F67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "A263FA56-5F1F-4E91-A354-38648E130685", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*", "matchCriteriaId": "102AFB09-B4EC-456C-899A-A9ABDA120D54", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D24E8214-881A-4C15-A544-FB3FD5D14DCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*", "matchCriteriaId": "02454A49-0345-4927-89DF-7A37C25E4E11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1EDE72E-3734-4FB5-BC77-B7C3838D41F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E07450B-D81B-474D-9150-C9D8A62D44A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A892B60-7FD3-41A6-9997-586B76757416", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4701D592-F06C-4713-9736-19DB130B5E2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3E6063A-23C9-4845-B575-5D330B6C68F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D50C73A4-D52E-4560-B725-61F416E18505", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "25570E2C-BBE9-402F-9631-FA5014767CE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*", "matchCriteriaId": "D59D57C2-CFB5-486E-A340-E63C7D7A8B6D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "344A435C-1CC0-4EEA-84EA-48A223A529BC", "versionEndExcluding": "11.8.86", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:b150:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4A62BA8-3AE3-4339-97D3-4768A122C71C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:b250:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A2CDBC2-2B45-4E22-845A-EB8415D4C56D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F2CA68-9EEA-421F-A92E-E7685EC010EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC9F763B-B469-42DC-952F-48448121373F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C17DCC3-9200-4198-B08D-EAD531B59995", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "31CBD3FB-0835-4F28-BFA2-3D07459066F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7C8B4BA-24E8-4856-A2D9-BD2CE2C858AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F059A42-0B43-4F79-BBAF-6ED05CFFE7EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B6B298A-1480-41C2-BE7C-7291E7256D7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB3ABEFE-11A5-4EC3-9537-F9C75A46FF65", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*", "matchCriteriaId": "14C20D2A-CD26-4019-A266-AB4E89EBD2E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B608F333-BD78-4082-B2AE-0F5BBE7E0D9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F609E73-203F-45B9-9A3A-DC754B33860A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E3A734E-973B-4904-A905-51E438879B8F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CF355B2-A5D6-41CC-8404-2B61A594BA6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C51A38C-E4AE-46B9-ACE6-82E8F7B668D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E86321B-B1BD-43B7-A7F5-05CABE35F40E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*", "matchCriteriaId": "70EAC725-DC8A-4DA9-8B01-0465EBE86D6E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*", "matchCriteriaId": "25227F52-7398-4E68-A973-B9177886BE0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "B230FB82-C498-4118-97D3-3835CB713E87", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E993BEE9-72BD-4615-B1BE-5E9129D61ABD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFA6BB38-CDF8-46B0-9910-897AB7920D18", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF244D02-2B47-4884-8D70-37DFEB18CB60", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*", "matchCriteriaId": "615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE85AE7-B4BD-442E-AFAB-CD01744C91B7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2425FF8A-158C-40EE-BDBF-43E7641BC058", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADA681B4-37F8-4E2E-B73B-E0E17C66B754", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "173C6F98-4022-4F40-A39A-D3D490CA6461", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6EACCCA-7ADB-40B8-87DD-A55313E5BB97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F1BD53-55ED-4346-A67A-141B5BC552CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "44D7B5DF-716F-48E6-9445-BB56A620DEF1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F3E6176-6F6D-4488-A03B-2BBF846ADC93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF705120-459D-49BA-BDCD-6AC38D95C820", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B91585C-4BD7-475B-8AC8-1B813A698D77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFA675E6-83DD-47FF-BEBC-D32E5223A065", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*", "matchCriteriaId": "F479F7E3-D0FA-4F66-8F5B-FFC845FFE5A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A205DBD9-A841-446A-8ED8-57989B806518", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFEF82DB-59F7-4530-B3CC-3D417CD519B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*", "matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*", "matchCriteriaId": "73DA1253-1652-417A-BE27-586EF8ED59F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "790A7B55-AD96-4B1C-A31A-C6778BFD5CC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*", "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D566CFB-935B-40E4-9F4E-6216A42E7EBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A97ED15-D0C6-4B64-BA08-EE50A6990272", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D57834B-C031-4301-9839-7A32F13687EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEE126ED-B743-4C6D-95FF-04F473A9A008", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D901944-8E2B-41E5-BB82-CF1C97064711", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A13E353-0063-468B-96CD-97BF91C747C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "913BBEFF-49E7-42AF-A850-B49E5A12AB98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8C1205B-6AC7-4DB5-B247-2108511D9957", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA47107D-237A-4184-8BA2-601660F7FB5C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9862E49-124E-4B7D-941A-CFD2668B6481", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE6572E2-5B24-4E21-9F6F-3A7A17A9F098", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*", "matchCriteriaId": "85C7AD56-CA31-4C08-A5C1-B50E767E1FFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*", "matchCriteriaId": "18340F86-5545-4EEF-9F79-6560BB24F277", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC6872D8-0625-4404-866D-6592319E513C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h110:-:*:*:*:*:*:*:*", "matchCriteriaId": "09271283-1681-4EB4-8BD3-DE01674D4D19", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h170:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B23A6C6-89CF-42CA-A3D0-E17EB8104BBE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h270:-:*:*:*:*:*:*:*", "matchCriteriaId": "2715B64C-204D-4243-944E-434FDA366AA9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q150:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A05885-8AFD-4FFA-BE18-9CE24A1427B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q170:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7BB0694-7F15-4784-97AA-9E9783B3702C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q250:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6E4C9D1-C1E8-43E1-88B8-76637A991EB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q270:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E68EB4-7634-42AB-8DCD-8C87C86F78E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*", "matchCriteriaId": "E20F674C-6522-42E4-85D9-B4C39A882D20", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:z170:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6E0469E-FFC6-46BF-BB03-34326D1DBE19", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*", "matchCriteriaId": "955612CC-223F-47C0-9D75-D71A39E61A3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "3534330A-7977-455C-B154-C21DB841D80A", "versionEndExcluding": "11.12.86", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:c420:-:*:*:*:*:*:*:*", "matchCriteriaId": "69ECA4C4-3A03-4C07-9461-63C84221CD80", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*", "matchCriteriaId": "E20F674C-6522-42E4-85D9-B4C39A882D20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBA1D370-9B27-4535-8003-8F6A4A8D4A46", "versionEndExcluding": "11.22.86", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B9B4AE9-72ED-43CB-9705-ED6BDD80AEC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c621a:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2364774-DA5C-48BF-AEDB-E97BFED643F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*", "matchCriteriaId": "C51E9A02-E6FC-42AD-8269-07EFEFD2ADD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*", "matchCriteriaId": "92911979-A714-4643-AF03-64EDBD42DFF5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*", "matchCriteriaId": "79973EAB-9106-4417-88AF-8AC368E58050", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBB31B9D-05BC-4D0E-8CC8-52757131A6CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*", "matchCriteriaId": "C518A082-388F-4DDE-8FDF-FEA95FD69B49", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BBE62C7-76BD-4684-8CDE-68DBFF4E5280", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA2DAF1D-8994-491E-BD65-642C23778DB7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0DA068-0D77-4358-BDEE-572811836689", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8B0316B-1968-4502-955D-78E9BDC2E30C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*", "matchCriteriaId": "955612CC-223F-47C0-9D75-D71A39E61A3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE3DC49E-D0BF-49CD-BF8D-6EF4B949C4E2", "versionEndExcluding": "13.50.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*", "matchCriteriaId": "04CEC115-871B-4222-A3F8-6B1EE15E9A2C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FD0BD9D-F741-457D-9495-8BCC3707D098", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2935CEA-13CE-4F4C-84B1-0318FB6FE39A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3BB7241-F796-44A7-8171-B555A45FF852", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F967E7C-E56D-46B2-AEB8-1931FA324029", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D902C7F-DCE8-41ED-8E80-26DA251FBF36", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*", "matchCriteriaId": "71C505E0-3548-49BD-9B53-2A588FF29144", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E735023-A75C-48E3-AD6B-BB29CF95B17F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*", "matchCriteriaId": "3826FEBA-0B2E-403D-9A6A-0DA02FEF9A2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*", "matchCriteriaId": "4080CDEF-3938-44D5-9737-6A9D72DB54B7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77976A7-6C2D-4E0B-A28B-06A23EEA0D68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5600350-04CC-4481-AC47-9F98BEB9D258", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5A64D0A-D1C2-41B3-B51B-563263438CA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*", "matchCriteriaId": "B57F4250-80C8-4612-97F6-2702D3F7DF25", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AA180B4-0EB8-4884-A600-BFAEB64A0A58", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*", "matchCriteriaId": "27D79952-8946-488A-8BD8-6129D97A8E34", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B17905A-95E2-4E60-8A0F-AA8ABAF9D523", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*", "matchCriteriaId": "752081F5-AE8D-4004-B564-863840AC52E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*", "matchCriteriaId": "5375A75A-85AA-4119-9F6C-1AD9D2550F6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n4000c:-:*:*:*:*:*:*:*", "matchCriteriaId": "1795C64C-E28B-4003-84B6-AB4140C20750", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n4020c:-:*:*:*:*:*:*:*", "matchCriteriaId": "C92E6F6A-82C6-4485-B381-1EFB85B8B1F0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*", "matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE7B5E21-2796-4578-998F-B03E26277DE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n5095:-:*:*:*:*:*:*:*", "matchCriteriaId": "77D279BF-5561-4B83-B05C-77597339ECB4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*", "matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D31CA93-6F45-4BCE-B504-35F6494B864C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*", "matchCriteriaId": "406E9139-BCFF-406B-A856-57896D27B752", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_silver_a1030:-:*:*:*:*:*:*:*", "matchCriteriaId": "2333A48E-DBE1-47CC-BCFD-FEE0219AD858", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC903FA4-2C4E-4EBB-8BFA-579844B87354", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*", "matchCriteriaId": "667F2E6C-C2FD-4E4B-9CC4-2EF33A74F61B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DF16D51-5662-47C3-8911-0FACEEDB9D80", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECC4430E-E4B1-454F-8C95-6412D34454C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*", "matchCriteriaId": "31282347-8DCB-4B37-A853-DFD9D5AF31EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*", "matchCriteriaId": "42841FAC-A6EC-44F3-9FCD-B4549A783014", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED3DFF13-16FD-40C3-9762-0D1AE79DB527", "versionEndExcluding": "15.0.22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*", "matchCriteriaId": "D63F16DE-E30E-4268-B079-E07FD28355BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*", "matchCriteriaId": "936DAD12-11D6-4AAF-B48D-5076C94BF30C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-11100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFD8DB12-8CBE-4140-97A2-B88C3BF61E6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C60AF0D-983D-454E-8940-209C471DC041", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F26C6DA-ED6B-444A-A63A-5155FCA4F0DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*", "matchCriteriaId": "66BAF09D-8199-4579-B25A-E7C5177385E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "21EA30AA-713F-40AD-8C94-C1129198EE98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0D9B687-C3EE-4AF5-B9BE-7F0698D0F258", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "114DF43C-839F-4066-AA30-8DC16B1D6687", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BCD9C35-95D0-49E6-A9AC-E3AA8CD3F7B0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B40E9EC2-A8A6-4800-9F9E-B1237832D6F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "158CC66D-32E5-4396-8E5D-4D90EE9AB62C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*", "matchCriteriaId": "55227C1C-D6CE-40AD-A5AA-7143E0A7AEF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E84F0381-296A-408E-90D4-A316EE894A9D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*", "matchCriteriaId": "092E3E45-5F58-412F-BAC9-C3B5290D8349", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EA7E6D0-0ADA-4BE1-8273-69AB3DE3BA36", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6FCAFC0-EEE2-43E4-AE90-1803588B5689", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8640175-3BC2-4C7B-A5A3-51E5677EDECA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "7077CBF1-1FC8-4AF9-8B39-A15871FFD3CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "53D902B5-D135-4961-AED9-EA6DF06534B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*", "matchCriteriaId": "2910EB49-C9C6-4FC9-AA55-E7A0DAE28B93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "B858B433-9DA0-4224-B94C-4962FB3A4138", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F6B5FC3-8E55-430A-A55A-AF541690C576", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11500b:-:*:*:*:*:*:*:*", "matchCriteriaId": "06660D0F-FBB9-4C44-9972-DCE0E6249D7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*", "matchCriteriaId": "55568460-F318-48FB-90E4-55CBBAF13E59", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7AFF680-DBC6-432E-A6DE-E7E7E4F2F26A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADB84973-3DAC-4458-A817-943302F5EFF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B26C730-32FA-4D51-88FA-E724147147BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFF7C5BF-E151-42DB-B0CF-E2589904C9A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "E12D6BD2-7D32-4194-84D3-A0DE4B88BFF0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3EC487F-B9A8-410F-AE1F-8D1B74BA77D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*", "matchCriteriaId": "63719B1D-5A98-44E3-80D8-CF0B4C1C6F80", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5365D3B-1B0B-416D-ACFB-23843FD25EAF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*", "matchCriteriaId": "2556EF0A-B29F-4E9E-BB77-955CBC851EFA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "5601E40A-96E1-4321-9682-055A1C607488", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF36D9CC-2FD8-4D08-8712-E625D4754613", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A59A0C-91F2-4AE7-AF60-D98059542438", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*", "matchCriteriaId": "3252CF19-9D1D-4A46-9C94-0E7255CDDD8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "E11C7F38-3313-4F6D-9D5D-E61C89E716B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "70B0C976-3B68-4647-909A-5D574D711C7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA18192E-7DBB-45BB-8568-CA7159AF8CE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2FDB568-5340-4DD8-B933-1CD64C370BD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28DF93B-E15D-47D3-B9C0-4AEE8B7FADD0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F2DD1D-DB6F-44D1-BE3B-C798C09CC5F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "12ADA9A2-6E64-4F17-B369-816639F0D3BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*", "matchCriteriaId": "514B7B5E-D60D-464A-8CB0-273044FD2E09", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFB608EE-83AF-4192-93E1-7DDBA5F6A54C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "B807B5D8-BCDB-4398-8ADC-DBD1BD8D2B88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CC25725-73F6-4948-B17A-A05E8978EB78", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D9BFA32-89B3-4E26-B980-2694B5378D8B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*", "matchCriteriaId": "65E2A7C5-78D9-4F75-B8A2-5EB3ECEFBFF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2D04A37-79EE-467B-BD8A-0CA0BDD85F0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900kb:-:*:*:*:*:*:*:*", "matchCriteriaId": "84C7E63D-3622-4F10-94E1-E03357C5C167", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FECF6BE-2CED-4510-91C5-195686C9C421", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B903E2A0-EE73-4F13-AB26-8F5644462E94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*", "matchCriteriaId": "170B497C-05F2-46B5-92CD-ACF7C0BE1711", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEF53EA8-8EB4-455C-A986-405DBB122D3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B485AC9-B986-4100-90CC-E4BC9B1AAFD1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F76BE235-C991-43BB-B145-239D95084BC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6748F85C-A99A-4380-B01A-A51DBD43AED9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*", "matchCriteriaId": "421F0AF2-5F41-4F0C-A909-D76D72AB5FCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C04332C1-9652-44ED-BD97-5A6AD0A4E6B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D376C32-99BE-4DF4-A63D-2156D10EEA73", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE118AB2-A2C4-452C-B9AD-DDEF65B5EC67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA0D6C21-7DCE-4F8C-9394-D0006695550D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD6B51B5-96AA-44C8-9539-9D7F67143DC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB78854-1E03-48F3-BC86-B0934641B47E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D3350F-8083-4FD3-9432-36C10EE911EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB28789-A195-4EB8-AE96-6E1EFEE93E6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C96A17A-44EE-4FD0-9187-9BB9202AA9C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D6425C6-A338-42A0-B236-12B33147931D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF3F6453-51EF-4509-94CB-24E8ECFBAC5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4861FF06-6720-4E5A-B599-F7F96D7D4FE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF098E89-4979-45DB-AF4C-A5D0F5CE6F67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "A263FA56-5F1F-4E91-A354-38648E130685", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*", "matchCriteriaId": "102AFB09-B4EC-456C-899A-A9ABDA120D54", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D24E8214-881A-4C15-A544-FB3FD5D14DCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*", "matchCriteriaId": "02454A49-0345-4927-89DF-7A37C25E4E11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1EDE72E-3734-4FB5-BC77-B7C3838D41F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E07450B-D81B-474D-9150-C9D8A62D44A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A892B60-7FD3-41A6-9997-586B76757416", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4701D592-F06C-4713-9736-19DB130B5E2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3E6063A-23C9-4845-B575-5D330B6C68F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D50C73A4-D52E-4560-B725-61F416E18505", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "25570E2C-BBE9-402F-9631-FA5014767CE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*", "matchCriteriaId": "D59D57C2-CFB5-486E-A340-E63C7D7A8B6D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "480C5657-5C05-40F5-B76A-E67119727ED8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6422BF3-01B7-443B-BD2B-80E45D7C3F5F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "696F47E6-C1CA-4A58-A91F-4B3EA92954AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76E9B752-2DA7-4182-A52E-C13F93FB2B22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D1BCD50-6174-49A7-BEE4-BD7DD72C09AE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*", "matchCriteriaId": "55156889-E9DA-4F04-B894-339DC39CA942", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEB756BB-E343-451A-866D-40B41E059705", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18A51183-A6EF-4AC8-9A85-29FF7768AE3A", "versionEndExcluding": "25.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2A29C2D-A16F-443F-AA01-535B43F8BBBA", "versionEndExcluding": "25.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0368B9A-D5FB-4EDA-88BA-E44901F2A0BA", "versionEndExcluding": "25.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41A30BE8-ABAD-48E0-A4B1-1EBD53A31647", "versionEndExcluding": "25.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87F0538B-ED6E-40C7-9C2A-4C5DC3D2935E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "324ADC7E-AECD-4B7D-8571-5399542C2BF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper initialization in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, 13.50.11 and 15.0.22 may allow a privileged user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Una inicializaci\u00f3n inapropiada en un subsistema en Intel\u00ae CSME versiones anteriores a 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32, 13.50.11 y 15.0.22 puede habilitar a un usuario privilegiado para permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local" } ], "id": "CVE-2020-24507", "lastModified": "2024-11-21T05:14:56.360", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-09T19:15:08.833", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0004/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-665" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-09-12 19:29
Modified
2024-11-21 04:05
Severity ?
Summary
Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "503E551C-FC5F-4ABC-8DEA-E360701F0B33", "versionEndExcluding": "22.01.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33F546AF-8F80-4E0A-9B92-86E3A1F931C0", "versionEndExcluding": "21.01.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B5B6E6B-16A0-4236-AABE-82385B53EC78", "versionEndExcluding": "21.01.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D476D093-4A97-499C-B40D-7A301BC9AA2E", "versionEndExcluding": "r1.30.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pc547e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6A757F1-E478-4A3D-8D5F-C996E176A11A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30F129DB-51AC-4F40-A0D1-AB5CF90D9C2D", "versionEndExcluding": "r1.23.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "790D244A-AC3D-4BBC-9139-A90048FD375A", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C046182-BB33-41D0-B041-1566B8041917", "versionEndExcluding": "19.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DE74300-E061-452E-AD1D-6DD7C2C62729", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE4A7C13-6F81-4629-9C28-9202028634AE", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D87239-40C1-4038-B734-D77AC4DDD571", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93485235-481B-4BAF-BB7A-81BB5AA1BC53", "versionEndExcluding": "19.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F37D88-E086-4060-8420-BD0F8D8FF580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD949046-46E5-48C9-883B-92F04926E8BC", "versionEndExcluding": "23.01.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C23AFAB4-B286-4FD6-ABC3-86B2881E271C", "versionEndExcluding": "12.0.5", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5FAD938-027A-406F-9E7C-1BFD992839F4", "versionEndExcluding": "12.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63591E72-6038-4417-BA10-54180507AF0F", "versionEndExcluding": "11.0", "versionStartIncluding": "9.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Intel AMT in Intel CSME firmware versions before version 12.0.5 may allow a privileged user to potentially execute arbitrary code with Intel AMT execution privilege via local access." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en Intel AMT en el firmware Intel CSME en versiones anteriores a la 12.0.5 podr\u00edan permitir que un usuario privilegiado ejecute c\u00f3digo arbitrario con privilegios de ejecuci\u00f3n AMT mediante acceso local." } ], "id": "CVE-2018-3657", "lastModified": "2024-11-21T04:05:50.857", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-12T19:29:02.840", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106996" }, { "source": "secure@intel.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:microcode:-:*:*:*:*:*:*:*", "matchCriteriaId": "B78FF9EC-BB2A-4352-9BE7-EFA749C99A9D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C60AF0D-983D-454E-8940-209C471DC041", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F26C6DA-ED6B-444A-A63A-5155FCA4F0DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0D9B687-C3EE-4AF5-B9BE-7F0698D0F258", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "114DF43C-839F-4066-AA30-8DC16B1D6687", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "158CC66D-32E5-4396-8E5D-4D90EE9AB62C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E84F0381-296A-408E-90D4-A316EE894A9D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "5601E40A-96E1-4321-9682-055A1C607488", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "12ADA9A2-6E64-4F17-B369-816639F0D3BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FE996B1-6951-4F85-AA58-B99A379D2163", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C61DF9A-ABDE-44A2-A060-B088428D5064", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD7447BC-F315-4298-A822-549942FC118B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "17C3B32E-E1F2-446A-B8AE-5F3E285BD5B2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:hci_storage_node:-:*:*:*:*:*:*:*", "matchCriteriaId": "02DEB4FB-A21D-4CB1-B522-EEE5093E8521", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3BCF7CA-6C05-4FD5-A965-0F038F63D70A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:netapp:solidfire:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4588E5F-58E1-4C82-9551-8EAD5FFE08B3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5320759-AAAB-4FEA-99AB-51A7F7EE9F58", "versionEndExcluding": "22.01.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "480C5657-5C05-40F5-B76A-E67119727ED8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F6CA254-45AF-497D-9D1D-0CF4A8922883", "versionEndExcluding": "21.01.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5AECF7C4-3FF7-4663-A49C-9DB91BA5C28E", "versionEndExcluding": "21.01.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "26B17683-E061-4CB9-BB8E-9EC8612DA1A1", "versionEndExcluding": "21.01.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6779ADD8-298D-4FF4-8AD3-82E995B2E144", "versionEndExcluding": "25.02.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D3BECCA-5783-4B3C-B659-21160B4D2726", "versionEndExcluding": "25.02.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF2E9EAA-2D26-4271-B2A3-CA3BB71D0149", "versionEndExcluding": "25.02.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C5CB316-59B9-4DDB-A8B8-14D8BCD991CE", "versionEndExcluding": "25.02.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4ABF49D4-34CE-4DEA-AA2E-A40A53472D1F", "versionEndExcluding": "23.01.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper isolation of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Un aislamiento inapropiado de los recursos compartidos en algunos Intel\u00ae Processors, puede habilitar a un usuario autenticado para permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local" } ], "id": "CVE-2020-8698", "lastModified": "2024-11-21T05:39:17.130", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-12T18:15:16.783", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" }, { "source": "secure@intel.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0006/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2021/02/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MAAGIK5CXKBPGY3R4UR5VO56M7MKLZ43/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00381" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-668" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-11-12 18:15
Modified
2024-11-21 05:39
Severity ?
Summary
Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
References
▼ | URL | Tags | |
---|---|---|---|
secure@intel.com | https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf | Patch, Third Party Advisory | |
secure@intel.com | https://security.netapp.com/advisory/ntap-20201113-0002/ | Third Party Advisory | |
secure@intel.com | https://security.netapp.com/advisory/ntap-20201113-0005/ | Third Party Advisory | |
secure@intel.com | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf | Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20201113-0002/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20201113-0005/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "BA64E7EE-8977-4427-9FF9-DD9FE80F02C6", "versionEndExcluding": "11.8.80", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "3DDDD0D3-CE11-49C7-93F7-F2AA1053DD86", "versionEndExcluding": "11.12.80", "versionStartIncluding": "11.12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A5C4B3E-3C68-4D2B-A181-18A71378362E", "versionEndExcluding": "11.22.80", "versionStartIncluding": "11.22.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "EB22E6F2-D34F-4A05-9CC2-BCAF3E84F54E", "versionEndExcluding": "12.0.70", "versionStartIncluding": "12.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "94D40FF5-8E0A-4591-9CE4-2E671C8E4F2E", "versionEndExcluding": "14.0.45", "versionStartIncluding": "14.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "2B323721-380E-4222-AB7A-9993BF8DA653", "versionEndExcluding": "14.5.25", "versionStartIncluding": "14.5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:trusted_execution_technology:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF1D6613-FA0F-4859-B45C-A0F86BCF1CF8", "versionEndExcluding": "3.1.80", "vulnerable": true }, { "criteria": "cpe:2.3:a:intel:trusted_execution_technology:*:*:*:*:*:*:*:*", "matchCriteriaId": "D4BA87F2-F5DE-44A1-B81A-CE1DB5EAFEFA", "versionEndExcluding": "4.0.30", "versionStartIncluding": "4.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_drive_controller_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AA19F1AE-18D4-43F6-BBAB-225B241042BC", "versionEndExcluding": "05.00.01.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_drive_controller:-:*:*:*:*:*:*:*", "matchCriteriaId": "0137C77B-D587-47D6-AEBE-462D00546FD7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_et200sp_1515sp_pc2_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FC1D3E4-0B86-4464-96BE-D938B379FDAE", "versionEndExcluding": "0209.0105", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_et200sp_1515sp_pc2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CA8F936-9C3B-46C0-9623-0AF16A4B0294", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5320759-AAAB-4FEA-99AB-51A7F7EE9F58", "versionEndExcluding": "22.01.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECC5341D-9982-4F18-9C8D-2912DDB8EF9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "161DFB8B-6B7B-4F6D-9452-EF43A70BBE50", "versionEndExcluding": "27.01.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F63C0B17-60E2-4240-92FD-4B7C7D8F2C8B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CA71050F-CCED-4885-A483-79CC43F6AEC9", "versionEndExcluding": "27.01.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D3CD5B0A-D4B1-41D2-8709-D49D927982FA", "versionEndExcluding": "27.01.05", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false }, { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65A6E7CD-4AEA-465D-89B3-6EF66E4F17B6", "versionEndExcluding": "1.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*", "matchCriteriaId": "55156889-E9DA-4F04-B894-339DC39CA942", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEA68927-4910-4DF3-A16B-7187099CC063", "versionEndExcluding": "r1.30.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6779ADD8-298D-4FF4-8AD3-82E995B2E144", "versionEndExcluding": "25.02.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5D3BECCA-5783-4B3C-B659-21160B4D2726", "versionEndExcluding": "25.02.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc667e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6822E36B-D635-498B-9A64-BE427DC798EA", "versionEndExcluding": "25.02.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc667e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E6BC195-47BB-48A7-8D73-F800B4C11599", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C5CB316-59B9-4DDB-A8B8-14D8BCD991CE", "versionEndExcluding": "25.02.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4ABF49D4-34CE-4DEA-AA2E-A40A53472D1F", "versionEndExcluding": "23.01.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinumerik_828d_hw_pu.4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC13F580-5446-437D-9982-280C80EAE2D3", "versionEndExcluding": "08.00.00.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinumerik_828d_hw_pu.4:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C594847-596D-4FA2-B56C-745D0A84EBC9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinumerik_mc_mcu_1720_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DF3A945B-078B-45C6-9BA3-3C52650095F1", "versionEndExcluding": "05.00.00.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinumerik_mc_mcu_1720:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF61B283-76B7-42BB-B88A-EE12EA5AA905", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinumerik_one_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FADF6B2-FFE7-4C4E-BF93-61CAA9368285", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinumerik_one:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE30FFDF-5494-400D-8F88-954A6B1503B9", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinumerik_840d_sl_ht_10_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD5F035E-5F72-4E15-BF13-294C3A833BF7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinumerik_840d_sl_ht_10:-:*:*:*:*:*:*:*", "matchCriteriaId": "14CED950-F0AB-48D1-9ED8-3357E02AEADE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinumerik_one_ncu_1740_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE992410-C477-4901-8B18-8AB866BF11A6", "versionEndExcluding": "04.00.00.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinumerik_one_ncu_1740:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0BCDA32-9100-4D88-A304-CE989A16A06D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinumerik_one_ppu_1740_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B4A4EDCE-6363-43EB-9CE8-11C0BA40E696", "versionEndExcluding": "06.00.00.00", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinumerik_one_ppu_1740:-:*:*:*:*:*:*:*", "matchCriteriaId": "75815DC0-5782-4BD6-A9DD-F0BE33D2F5FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Insufficient control flow management in subsystem for Intel(R) CSME versions before 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 and 14.5.25 , Intel(R) TXE versions before 3.1.80 and 4.0.30 may allow an unauthenticated user to potentially enable escalation of privilege via physical access." }, { "lang": "es", "value": "Una administraci\u00f3n de flujo de control insuficiente en el subsistema para Intel\u00ae CSME versiones anteriores a 11.8.80, 11.12.80, 11.22.80, 12.0.70, 13.0.40, 13.30.10, 14.0.45 y 14.5.25, Intel\u00ae TXE versiones anteriores a 3.1.80 y 4.0.30, pueden habilitar a un usuario no autenticado para permitir potencialmente una escalada de privilegios por medio de un acceso f\u00edsico" } ], "id": "CVE-2020-8745", "lastModified": "2024-11-21T05:39:22.207", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.9, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-11-12T18:15:17.300", "references": [ { "source": "secure@intel.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0002/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0005/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-678983.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20201113-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00391" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-06-15 14:15
Modified
2024-11-21 04:53
Severity ?
Summary
Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_1000m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8BE23AB-1F5F-4FA7-8617-D4A4C9D5F6A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_1005m:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD5FDB66-4805-4EB5-B6BE-938D40C48C25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_1007u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DD7CD7F-F0F4-408E-858C-8EB9BC82382E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_1017u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F898D49D-6B5C-45AA-A166-BFCE5CC9A6E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_1019y:-:*:*:*:*:*:*:*", "matchCriteriaId": "29560B2E-DAC6-478A-84AE-508AE21D0AEE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_1020e:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAB9B322-ACB3-4505-8281-2A365A21D286", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_1020m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D54B11B-18A3-4DEE-84FF-B5A32C7E60CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_1037u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0198F9C-60DA-4D91-9FD2-5CC65ED346ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_1047ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7F39FE0-A9F4-4232-B925-598E4F9167A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_2955u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6886FA9-E9FE-427C-A403-45C554ADA19C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_2957u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3BE78C2-660F-4C48-B0F1-05D0116F0FDE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_2970m:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDB04659-871D-4B1E-9681-D5ADCEAE2CE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_2980u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F21EEA7-EE23-483B-8B01-5324E0063B2F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_2981u:-:*:*:*:*:*:*:*", "matchCriteriaId": "29792C69-EAE9-4DD9-B127-5AF1FFA9A1D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_3755u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B8FA7CE-FF47-4918-8171-EDCEA156C314", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_3765u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2F086FB-60AA-421A-BA6C-C687B54A4993", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_3855u:-:*:*:*:*:*:*:*", "matchCriteriaId": "44FEB5D1-5177-4B5E-BB06-0C7E2A0CA6D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_3865u:-:*:*:*:*:*:*:*", "matchCriteriaId": "20F761B4-2DCE-4E31-9974-C399B4982EFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_3955u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9796C997-40C0-4C75-B2B3-06D037138976", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_3965u:-:*:*:*:*:*:*:*", "matchCriteriaId": "11F8482B-2E48-4976-83D0-F1E4BA015FEA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_3965y:-:*:*:*:*:*:*:*", "matchCriteriaId": "D36CCEB4-62C0-427D-B4B3-41F9B1B9194E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_5305u:-:*:*:*:*:*:*:*", "matchCriteriaId": "39831D4E-743A-4C09-900F-24DDAB5D1B22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_725c:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED49334B-38E1-4212-A23F-FE5437B773CE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_927ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5AD98D1-5A73-4A92-A6F5-D9DDC14056AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1610:-:*:*:*:*:*:*:*", "matchCriteriaId": "4003B029-36AE-47CD-BFB1-1F06DFEBA0C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1610t:-:*:*:*:*:*:*:*", "matchCriteriaId": "FADF19F8-54BB-4BF4-BF1C-515EBBEE2060", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1620:-:*:*:*:*:*:*:*", "matchCriteriaId": "B67D44E3-F8E1-4EB9-8D91-5777DC97D497", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1620t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E4AC5E9-94DB-4970-BE29-747503AE81E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1630:-:*:*:*:*:*:*:*", "matchCriteriaId": "06FFA194-E200-4F4D-8E66-60D0134184E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1820:-:*:*:*:*:*:*:*", "matchCriteriaId": "12FD8D3B-0FC0-4E8A-9476-3092BAE9F15E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1820t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B950F6FC-2848-45B7-9C28-B0DF46BC442B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1830:-:*:*:*:*:*:*:*", "matchCriteriaId": "95101653-A2BF-47F5-A209-097CA98A91F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1840:-:*:*:*:*:*:*:*", "matchCriteriaId": "B72870A6-E156-46AE-A5C4-B9B8F10C147D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1840t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD76063-D9C2-4F41-B7D3-29A32678B527", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g1850:-:*:*:*:*:*:*:*", "matchCriteriaId": "95826FC7-9E92-4C6A-8F16-9D20B8E41F75", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g3900:-:*:*:*:*:*:*:*", "matchCriteriaId": "25847980-2D7B-4D4B-B0F2-C2CAB648182C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g3900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5723C9D-E59D-4FA3-893F-D79E726025C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g3900te:-:*:*:*:*:*:*:*", "matchCriteriaId": "25BC4638-06F6-41C9-BF0F-74037F24CBEF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g3902e:-:*:*:*:*:*:*:*", "matchCriteriaId": "11A64939-F09B-4FEC-8F1D-FAC34D8E14BC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g3920:-:*:*:*:*:*:*:*", "matchCriteriaId": "77D7291F-752E-409F-82BE-6060BA5E2559", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g3920t:-:*:*:*:*:*:*:*", "matchCriteriaId": "17560EF4-27C7-466A-9CD1-164F1B0F5B79", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g3930e:-:*:*:*:*:*:*:*", "matchCriteriaId": "226CBC16-EC2A-4498-ADB3-655A0E9CF396", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g3930te:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9278297-5E4B-40D0-8782-E5AE87E43B7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g3940:-:*:*:*:*:*:*:*", "matchCriteriaId": "A562A07B-EDC4-4545-AC10-6CAA1494C6E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g4900:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B801EF4-980C-40EF-84A8-4AA2D29CFB06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g4900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2129E439-63C1-4CBF-B39D-2941621AB454", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g4920:-:*:*:*:*:*:*:*", "matchCriteriaId": "26E9CDAC-8C63-4F9A-B171-9E5E11E5313E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g4930:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA2A4A2A-CB99-4AEC-B0EB-11763E6C0E0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_g4950:-:*:*:*:*:*:*:*", "matchCriteriaId": "22828766-08EF-430F-A0F0-F59E772E38B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_4205u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6F8D167-C5B9-4B15-8861-529598D1C491", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_4410y:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E6A6A15-1406-41C8-84F8-E0C202F554DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_4415y:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4B0FE5D-07FD-43E7-B89E-BDE6D6F49D30", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_5405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "61FFCFE8-2B6E-4EB8-965C-AA5CB5493516", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_8269u:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDB4120A-B29F-496B-8FEB-CFD4A155202C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_9300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "04AA92B3-DF06-45C3-8E46-D721262EFE71", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_9750hf:-:*:*:*:*:*:*:*", "matchCriteriaId": "454DA7E4-ECDE-40C8-AA8F-181333BEFBE1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-2115c:-:*:*:*:*:*:*:*", "matchCriteriaId": "166ED4A3-9466-4072-BD9D-B10AE3B98D31", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3110m:-:*:*:*:*:*:*:*", "matchCriteriaId": "60EEC961-3871-47C8-87F3-E803E2DD63CE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3115c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBB7DD58-9F34-42A7-90D6-39B29933527E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3120m:-:*:*:*:*:*:*:*", "matchCriteriaId": "44C95EF0-D6F2-4F51-BA74-88B56F0FBED2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3120me:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE48E32B-9FF2-4F16-8E18-F982994457CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3130m:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4BF988-5A82-4A0F-97EB-8D709CE5417D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3210:-:*:*:*:*:*:*:*", "matchCriteriaId": "913D6C36-8335-46EF-9164-E6FABDFFB6B4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3217u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8A452D4-0DD6-43A9-9390-A62AE48AF310", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3217ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E95D40C-E599-4297-8079-39FA45AEA395", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3220:-:*:*:*:*:*:*:*", "matchCriteriaId": "E117D09A-02A0-4A4C-8233-98C42E94A580", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3220t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCCED1FD-FAC8-4E12-97DF-5ACAC0C55632", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3225:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8C1BC59-9CB9-4A88-B414-0F94AF440086", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3227u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5E6FE39-7A75-4897-8336-9E4AFD77E3C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3229y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFFB351B-14E8-4145-A733-07586AE4C920", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3240:-:*:*:*:*:*:*:*", "matchCriteriaId": "869B680B-2585-418B-9C5C-349A3339C753", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3240t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8009F20-942D-47B6-9C6C-3DB33C334ABF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3245:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DFFAE3-24FF-4A9E-B3AC-93406A362E58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3250:-:*:*:*:*:*:*:*", "matchCriteriaId": "A219AF5E-BD41-4BFE-A299-6B45DB027663", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-3250t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB755E29-BD69-4FFC-BEED-C5AE16357394", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4005u:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDC0FB13-6766-4ED4-BF2E-439BEAAA29D0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4010u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4201168-8AF2-4C17-8D49-89D77062B835", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4010y:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCB9DBB4-5202-4A51-94BF-330756FED881", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4012y:-:*:*:*:*:*:*:*", "matchCriteriaId": "10606356-43F2-4DEB-AB52-6810FDD4CE49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4020y:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D690FD7-DB10-4071-B156-09F49E71C479", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4025u:-:*:*:*:*:*:*:*", "matchCriteriaId": "225F1973-15DA-4D6D-89EA-17E6AA10C36E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4030u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CD2F2F4-395C-4AB5-AAB0-0CB6FEE8ACE8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4030y:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5AF7A04-AAC2-4B03-9F66-5078BECBADF4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4100m:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCF1BEDB-776F-4CAE-84F5-F29F7EE20D69", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4100u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6F33467-2074-4775-871F-013A513881A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4110m:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AD8C3F8-2B03-4FC3-826B-529B0AE005CF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4120u:-:*:*:*:*:*:*:*", "matchCriteriaId": "435E1592-37A8-4436-8755-95FB585579E9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4130:-:*:*:*:*:*:*:*", "matchCriteriaId": "92C15BE9-B984-4675-AE59-9E275C4763F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4130t:-:*:*:*:*:*:*:*", "matchCriteriaId": "983FD869-68B3-454A-AF09-4AAF2F59BFAA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4150:-:*:*:*:*:*:*:*", "matchCriteriaId": "06C65583-56E8-46E6-A0F1-A46405460188", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4150t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3D3C6D6-504F-4FC2-A871-C4B36A5949D8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4158u:-:*:*:*:*:*:*:*", "matchCriteriaId": "49482ADE-4DDE-448C-B491-88AFBBF08381", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4160:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D246820-03D1-48CD-9A08-2328D77428B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4160t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C714E08F-C724-4C36-99FC-4A85EB2B8BAA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4170:-:*:*:*:*:*:*:*", "matchCriteriaId": "793B03CA-B9F9-48CC-A0C6-E1FF86B71199", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4170t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F117F239-FA9C-4B7F-A1C7-F0EB0F24E003", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4330:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B0D3709-EB3A-48E6-9A7B-0108FAE2AF04", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4330t:-:*:*:*:*:*:*:*", "matchCriteriaId": "68066973-CB03-4AA8-9F24-D43C6F479348", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4340:-:*:*:*:*:*:*:*", "matchCriteriaId": "C242A17E-6A79-4435-BF37-C503D69EB3E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4350:-:*:*:*:*:*:*:*", "matchCriteriaId": "7555AB52-CE91-48FE-8950-9E8B98A184FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4350t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9D0B6B6-1CD6-4962-9054-7DB56D584248", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4360:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8042533-01E5-4C3E-9EF2-9AF475E2373E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4360t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D29161F8-B122-4544-9B7F-9C9498532E44", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4370:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4C82B27-415C-4C7B-B3AC-FE398581EE81", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-4370t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1A225BD-6E71-4EF0-A9DF-50AC5D94139B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-5005u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3F45AB6-55EF-4ED0-BBAD-E78894ED399B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-5006u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A4DB9FB-2256-4D44-9DCF-A8D6AFAE091B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-5010u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DA07BF1-F5E6-4AFB-AE92-26E3E5125064", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-5015u:-:*:*:*:*:*:*:*", "matchCriteriaId": "81A627BB-47E3-4870-8B66-92546ABA0060", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-5020u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6DD467D-BCB8-48CA-920B-5591A3E8D4C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-5157u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A64B0EA-FB22-4CE6-81E7-56CFFE12FC5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6100:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A6E16A4-5B81-412F-9B02-D15288F0EB52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6100e:-:*:*:*:*:*:*:*", "matchCriteriaId": "8448F47A-F956-4228-9A13-24AE86C532CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0B9E6DB-C9C3-4B19-915B-B2E6E4D12158", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "78C4115F-E374-47E9-A81F-CC06FA72C67F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6100te:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE81958E-5DFA-424C-9662-ECB1D9B738D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6100u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE0F2403-8146-4CA0-9E89-04022B375CEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6102e:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD67C284-EFCE-4530-8E68-42BB1B6F15C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6110u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E8CD54D-7BB0-4CA7-99C6-8E3EC20E2265", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6120:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE3DA00E-1BAC-4227-9ED0-F4757BC23B65", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6120t:-:*:*:*:*:*:*:*", "matchCriteriaId": "34E0E209-5CEE-418F-B99B-9142CDE9ADE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6167u:-:*:*:*:*:*:*:*", "matchCriteriaId": "20B1E424-885F-4BB0-9257-8284A18B1655", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6300:-:*:*:*:*:*:*:*", "matchCriteriaId": "BADEBE08-1478-4B88-9E06-5164BA0517DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D672383-B9AD-466E-8D6C-68DEC432B9A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6320:-:*:*:*:*:*:*:*", "matchCriteriaId": "D16BDFF3-4CC0-4423-8385-C5E49C941F49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-6320t:-:*:*:*:*:*:*:*", "matchCriteriaId": "048C652D-352D-4088-9986-30C280BC5C8B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7007u:-:*:*:*:*:*:*:*", "matchCriteriaId": "102122A3-D47E-4CD2-8151-4B708C39D3E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F2CA68-9EEA-421F-A92E-E7685EC010EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C17DCC3-9200-4198-B08D-EAD531B59995", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "31CBD3FB-0835-4F28-BFA2-3D07459066F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F059A42-0B43-4F79-BBAF-6ED05CFFE7EB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B6B298A-1480-41C2-BE7C-7291E7256D7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB3ABEFE-11A5-4EC3-9537-F9C75A46FF65", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*", "matchCriteriaId": "14C20D2A-CD26-4019-A266-AB4E89EBD2E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7110u:-:*:*:*:*:*:*:*", "matchCriteriaId": "04C8B673-9E57-4970-AC45-EE3526757425", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7120:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6F9C441-D99C-4BA2-9269-83283507D7D7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7120t:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF5748B4-1ED9-49DD-9140-DC7B47A30BB5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B608F333-BD78-4082-B2AE-0F5BBE7E0D9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F609E73-203F-45B9-9A3A-DC754B33860A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7320t:-:*:*:*:*:*:*:*", "matchCriteriaId": "00A6DEC8-14E3-4A0E-93A5-72BB607A9D18", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-7340:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C195F5C-9666-48C7-A1C0-43E189B17EEA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8000:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD3CA819-AFF3-47F8-AABE-A5F9DA89BAE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8000t:-:*:*:*:*:*:*:*", "matchCriteriaId": "06FDA087-0896-4138-9BA2-8238A845F5E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8020:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8A63B09-D870-411D-8B26-ACDEE48C10F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8120:-:*:*:*:*:*:*:*", "matchCriteriaId": "408A8035-BE57-435B-85A5-9C59D3B2DD42", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3-i3-8100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C25C1699-E656-4FA0-A9B7-59A3940814DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-10110y:-:*:*:*:*:*:*:*", "matchCriteriaId": "62BFF15A-0C78-45BC-8E71-EDF624AC162D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3210m:-:*:*:*:*:*:*:*", "matchCriteriaId": "16614725-F21F-45C9-85CA-9F9C8EFE0FBC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3230m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6659D386-A44A-484F-AAE1-EA5CB3F17528", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3317u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5427E131-5B27-4C64-BED0-C5780595831C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3320m:-:*:*:*:*:*:*:*", "matchCriteriaId": "9969E654-88F4-4F97-A737-C53D078BB9AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3330:-:*:*:*:*:*:*:*", "matchCriteriaId": "27934CF8-2FB2-4D04-92FC-081F31B18D5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3330s:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5552F0B-6AA4-4E55-8871-E3E61B78F0B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3337u:-:*:*:*:*:*:*:*", "matchCriteriaId": "94F26990-272B-4A25-AAD1-1CEE2EC96515", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3339y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FEC9E4B4-BDF7-4D6B-99E2-9DFD3408EA9B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3340:-:*:*:*:*:*:*:*", "matchCriteriaId": "9265D619-7C06-4297-BCA0-7B44AC3DE2BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3340m:-:*:*:*:*:*:*:*", "matchCriteriaId": "6BAAB044-56DD-4F28-B794-7F3DF8F403DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3340s:-:*:*:*:*:*:*:*", "matchCriteriaId": "2559481C-347F-4E3D-9E46-FB5E3E85682B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3350p:-:*:*:*:*:*:*:*", "matchCriteriaId": "46D61342-E48F-426E-A856-3E0EAD268E5B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3360m:-:*:*:*:*:*:*:*", "matchCriteriaId": "22D9B565-1A4C-4344-93E9-05390E036102", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3380m:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5262FA4-704A-4FD8-AFC6-B35B28768CFF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3427u:-:*:*:*:*:*:*:*", "matchCriteriaId": "96D540DD-94C1-4568-9275-01ED97A313BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3437u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AEBACE66-D68E-4D1D-9CDC-8A23F387BFE2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3439y:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBE75BFF-5251-4216-A49E-5CF2A8B69A0F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3450:-:*:*:*:*:*:*:*", "matchCriteriaId": "C862334A-9B62-4FE9-AD65-383A240E1E2A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3450s:-:*:*:*:*:*:*:*", "matchCriteriaId": "25345701-D7A9-47D9-8E84-BFD44669DBDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3470:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA2E8D01-9A86-45ED-8E5D-83A41D68FA5F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3470s:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABE78550-8862-4449-A114-39CDA89C4A6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3470t:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C3EBF20-9833-481F-86C4-65EF106D2438", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3475s:-:*:*:*:*:*:*:*", "matchCriteriaId": "29A1EFA9-49A9-4127-8AC5-78EA78162A8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3550:-:*:*:*:*:*:*:*", "matchCriteriaId": "26059622-2A47-4D95-B32C-867E19BFA204", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3550s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8E0A34F-29B3-487F-8FFA-63DC0E581F36", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3570:-:*:*:*:*:*:*:*", "matchCriteriaId": "163C5423-A6F8-4824-A823-962147C72BD2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3570k:-:*:*:*:*:*:*:*", "matchCriteriaId": "48BDE191-B712-4AE6-B577-788934849708", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3570s:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE7D55B8-E611-4D90-85BC-2159136C47B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3570t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3E241E2-9569-4F13-AE70-F717713AE845", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-3610me:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BA5C764-BF33-4035-B832-0C5B7A084081", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "13038065-613A-4560-AFC1-6CAD2C9D27EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4200y:-:*:*:*:*:*:*:*", "matchCriteriaId": "E44E93A2-5483-4CE5-B3E3-759BCDF67847", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4202y:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B769FF2-10FA-40F8-A702-CBF5EBB23B3A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4210h:-:*:*:*:*:*:*:*", "matchCriteriaId": "71BBDB01-D110-4B44-92D3-D2936F02E749", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "044D188E-792A-4007-9D87-6FB55AA685C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8D46072-8F46-4FCB-B161-7812B544C1A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4220y:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F6A65B2-FFBE-482C-8E08-19E3D72977DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DC0C2C7-F8A4-4ED0-B4FA-3372FAC11FA7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4258u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D98CCDE-E246-43B4-8778-9C357AF0C1C5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "58AD9023-0D04-4A77-BB47-FAB873342FF5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4278u:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C41E56-9836-4D9E-8289-B9BFF8836B59", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4288u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0A15D53-6CCA-42AE-8DDE-B11E004451DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A69BF8F7-AB89-43B0-BD04-F95E7C655766", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4300y:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5D97AAB-5FD8-40DF-B13F-D12356023873", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4302y:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A0F7C52-2F89-449A-810D-4EDE87729EC0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4308u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC2BEF57-EADD-45C7-93EA-4257A0F8571B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6778D27-5442-44EA-8B69-3E9C406A7109", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4402ec:-:*:*:*:*:*:*:*", "matchCriteriaId": "260C49FB-83F0-428B-861B-9A34B28EBA3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4430:-:*:*:*:*:*:*:*", "matchCriteriaId": "32531475-E54A-49B1-B15C-9366DE0BC003", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4430s:-:*:*:*:*:*:*:*", "matchCriteriaId": "430479CC-7246-424F-A514-96035A14BA6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4440:-:*:*:*:*:*:*:*", "matchCriteriaId": "061078C4-0B54-4BAD-9E3B-4114893FC8BC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4440s:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ECAE7B1-7948-45A9-B73C-B362846A13EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4460:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5B0D553-AB7D-453C-92C6-E3D08A7FAB08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4460s:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D153FDC-5420-4C9A-8FC3-2B29133F6F5F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4460t:-:*:*:*:*:*:*:*", "matchCriteriaId": "166B6B12-BEEA-4CB4-B194-B53F382CCC3B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4570:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F417FFF-166E-4158-8AAF-B2B46539792B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4570r:-:*:*:*:*:*:*:*", "matchCriteriaId": "829EDA96-60C4-4BC9-AAFD-2E3CFFD8D878", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4570s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1F9933E-9B7E-439A-8E10-AAC45C834A5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4570t:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB34FDE0-6251-4B88-AA3F-B883639256B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4590:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE57DEE6-5C9C-4A76-9EB2-7DD9A34599DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4590s:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BC6F12C-CADB-4D53-A75B-E7D98FF96383", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4590t:-:*:*:*:*:*:*:*", "matchCriteriaId": "62D4DE4E-9FE4-4488-8B14-59A87EB6E286", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4670:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DCB38B4-DC0E-4C23-9E51-16B73199D0D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4670k:-:*:*:*:*:*:*:*", "matchCriteriaId": "10FE39EA-B42A-4AD5-8343-0B644E795B3E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4670r:-:*:*:*:*:*:*:*", "matchCriteriaId": "4612D9EA-ACEE-449D-A32B-AAA9474B49B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4670s:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C47E01F-EACA-41C4-B478-F1E718B5EC52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4670t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CB47108-1104-4272-98B4-9458E1B1EA5B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4690:-:*:*:*:*:*:*:*", "matchCriteriaId": "50B07453-9E7C-4F2F-9B9E-B0F3A3710811", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4690s:-:*:*:*:*:*:*:*", "matchCriteriaId": "505D6E8F-51BA-4947-9667-9402ED9111EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-4690t:-:*:*:*:*:*:*:*", "matchCriteriaId": "74D12E38-F78E-4111-88FE-F8472F8A571B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-5200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "60A08817-7679-4B7B-8D32-08F7F42525CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-5250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8085F23-481D-4395-9071-5F79DCC4EFEA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-5257u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CB0B9DA-FB37-4E96-99E7-3345B53FDC2F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-5287u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7138774-E0CF-47C6-BA82-4034AA63AC1D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-5350:-:*:*:*:*:*:*:*", "matchCriteriaId": "444D4778-B28C-4DA9-9F44-C2D1ACE20BF8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-5350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7EA9832-4E75-4295-B0AE-AB632B043FCF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-5575r:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9BE5A85-4721-4AED-BC92-690094C877FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-5675c:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EDD172D-7ECF-4EF8-A731-0B6484240F23", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-5675r:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFE1C5F5-C523-4EED-8C5C-7EEBFE9E6D73", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F611716-F3D6-4187-AE71-4FF87C95C18E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "033028FD-BBD8-4BE0-B0D2-4744380D3EF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5F67974-81B3-43C2-8DAE-A66C6A876B7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6267u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1054FBFC-1609-4301-A0D0-B78878FB2427", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6287u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0F889F1-3B57-46C1-9C23-9E78CD0DEECF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6300hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "93929C7B-D4D9-436B-BA69-FD3C22FCEC2D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7F9109E-EADD-40F4-8360-BF7E37433E2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6310u:-:*:*:*:*:*:*:*", "matchCriteriaId": "02F5A50A-AAA4-440D-8AA3-54BE556322B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6350hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "41F7C959-BC66-40AB-8038-D37181A4CE5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6360u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B9B3858-E58D-471E-8F12-DC109A133B81", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D37104E-78E5-4368-B67F-1F8C63873C3C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3B6BBA6-BAA6-4258-8A5D-94CD786A3B96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6440eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "30DFA368-60E2-42D7-9C59-04F61F1A1FDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6440hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "0974E563-6326-4E79-95FF-40625440696E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6442eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B9D15BA-CC1B-4D83-9944-2593E2BA4AB2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6500:-:*:*:*:*:*:*:*", "matchCriteriaId": "467F294F-2FC5-4B2A-A1CD-4FE90F9D9C16", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E904FB93-EFF6-4E8E-92F2-95C4952B0240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6500te:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B232290-B3AD-4BB5-80B8-4CB3E6259A44", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "772568B9-C502-4154-9320-16D78BF60B34", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "912614A7-45BA-411D-AE77-610EFE8D2A35", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-6600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FBD651A-306D-4341-8DEE-2E928CA6E0EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E993BEE9-72BD-4615-B1BE-5E9129D61ABD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FD6FEF4-73DA-47B7-966D-9C0C16089423", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFA6BB38-CDF8-46B0-9910-897AB7920D18", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF244D02-2B47-4884-8D70-37DFEB18CB60", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*", "matchCriteriaId": "615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE85AE7-B4BD-442E-AFAB-CD01744C91B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2425FF8A-158C-40EE-BDBF-43E7641BC058", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADA681B4-37F8-4E2E-B73B-E0E17C66B754", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "173C6F98-4022-4F40-A39A-D3D490CA6461", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6EACCCA-7ADB-40B8-87DD-A55313E5BB97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F1BD53-55ED-4346-A67A-141B5BC552CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "44D7B5DF-716F-48E6-9445-BB56A620DEF1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F3E6176-6F6D-4488-A03B-2BBF846ADC93", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3C31236-EEDA-4558-944D-A6859F1A779A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF705120-459D-49BA-BDCD-6AC38D95C820", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B91585C-4BD7-475B-8AC8-1B813A698D77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7640x:-:*:*:*:*:*:*:*", "matchCriteriaId": "70B7093E-97DA-4BED-AE7C-87090B82E5E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFA675E6-83DD-47FF-BEBC-D32E5223A065", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-7y57_:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F5E4A60-291F-4F51-8F21-40928A95BA2D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*", "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8420:-:*:*:*:*:*:*:*", "matchCriteriaId": "874EF732-1067-45BB-BC15-DF815EC8CAFE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8420t:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD92F60E-0103-44AC-A377-52FFACB0A701", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8550:-:*:*:*:*:*:*:*", "matchCriteriaId": "1AB63EC2-E95B-43B5-BA7A-16314C968126", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8650:-:*:*:*:*:*:*:*", "matchCriteriaId": "238D4D09-7183-40D2-ABE0-4C477BCCEA49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-8650k:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CB1E0C8-5FFD-42A5-9798-1F324488A54A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-9400:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AC9F52F-6669-459A-A0A9-8F472E1F2761", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-9400f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7E91B92-4DB7-4866-8370-C6F8616D3D81", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-9400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "85F465BF-4548-45EB-AC40-384F4E6248EE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-9600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1DFFFEB-CC63-4F51-8828-C5D4E0287264", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5-9600kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B176D141-26B0-477E-B2DB-2E48D6FB82AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3517u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BF84DAA-69A2-4437-9AF5-972FB1569990", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3517ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "41804B09-DFF0-48E4-91AC-6499FDA21C26", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3520m:-:*:*:*:*:*:*:*", "matchCriteriaId": "71BDCDE0-A21F-47F1-A253-AAA5EDDD31BC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3537u:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB5B6864-B51C-4C31-AA93-C7C170F4BD28", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3540m:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D38D1F4-8332-4EFE-8998-86C654403C6A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3555le:-:*:*:*:*:*:*:*", "matchCriteriaId": "04D88300-9CC8-4725-9BEB-BA705CFD57A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3610qe:-:*:*:*:*:*:*:*", "matchCriteriaId": "1932E842-21A1-4D9F-A755-4201BD6721E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3610qm:-:*:*:*:*:*:*:*", "matchCriteriaId": "3257ABFD-7053-48BE-8827-311E9E922501", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3612qe:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8194009-767B-48E8-85FA-EB5F242C1B9C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3612qm:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CB92F26-67EC-4110-AD45-62530E662E45", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3615qe:-:*:*:*:*:*:*:*", "matchCriteriaId": "7035D479-4C83-4A41-9164-6D8557E8F598", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3615qm:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF5113F5-A058-414F-B82B-EE91C71DD4AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3630qm:-:*:*:*:*:*:*:*", "matchCriteriaId": "47D5CD40-9F2B-4021-B43E-E71B3E78B7E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3632qm:-:*:*:*:*:*:*:*", "matchCriteriaId": "09B0D125-332D-416D-A379-F0D7C1F9DA27", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3635qm:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDB62B03-84E1-4514-BA89-1E13705F672B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3667u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A036D2F8-6666-403C-B187-7884CE5D00A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3687u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2BBBA0B-7761-44BE-82CF-92C1C3E25CA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3689y:-:*:*:*:*:*:*:*", "matchCriteriaId": "89771BDB-E24E-48B1-885E-22B1A5BFD228", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3720qm:-:*:*:*:*:*:*:*", "matchCriteriaId": "59247DA5-9162-462A-9E3D-3FFB23CFCCED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3740qm:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C75CB4A-259E-4B40-B8E0-490B93DD11CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3770:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F47B9E3-118C-4270-824A-6A1BD2CC2121", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3770k:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAD0A970-9B15-4D9E-8644-15C5A93CEC03", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3770s:-:*:*:*:*:*:*:*", "matchCriteriaId": "0144B84E-7286-4316-B408-6F860FF03C28", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3770t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5709EB3E-5B0E-46C7-9B6B-26999818EE18", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3820qm:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFD1A362-9C06-4BB7-830B-B308BB44A3DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3840qm_:-:*:*:*:*:*:*:*", "matchCriteriaId": "904FF4A2-D2B6-4B3E-ACB2-3079F5098397", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3920xm:-:*:*:*:extreme:*:*:*", "matchCriteriaId": "521F58D1-C114-4D81-88AD-6EC56A7AC686", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-3940xm:-:*:*:*:extreme:*:*:*", "matchCriteriaId": "D596B65D-A288-4DF1-9022-9E4946039954", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "677C66EF-E9B9-430F-A19D-2D87AD83DBDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFC25D04-7FF5-4178-A7D1-795B6A6134E9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "238EA0E0-0FD6-4DA4-93C8-83490BB61A73", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4558u:-:*:*:*:*:*:*:*", "matchCriteriaId": "73BBB876-4CC0-48C9-A40E-B2A017D7E8BF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4578u:-:*:*:*:*:*:*:*", "matchCriteriaId": "757DBB7A-D8F1-4BA9-882F-4A112F41D3E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6B019A1-F44F-426C-BE8B-189E7B0CFDB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4610y:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DA22F64-0372-49DF-AB8F-0DF5519CB221", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D973CBCE-D6AF-49A5-A8B4-355E866DA51B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4700ec:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A9D9852-5090-4BD2-B311-E6A7B7837795", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4700eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "78AB646B-1FE3-44E3-A762-911843934439", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B4D9DD3-4EFD-448B-BA6E-175A99F47C99", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4700mq:-:*:*:*:*:*:*:*", "matchCriteriaId": "840CD8CE-E506-4273-9A42-80488E56FBE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4702ec:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A6E0594-D194-4840-A323-FE0EE56D7E97", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4702hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "794FB0BC-73A4-4FBA-8613-42057E8FCB1E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4702mq:-:*:*:*:*:*:*:*", "matchCriteriaId": "66B08A47-9478-4F1A-9959-BB9C7BC1C9E3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4710hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "43479AB1-1D98-48EF-BD29-3EA0127CED22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4710mq:-:*:*:*:*:*:*:*", "matchCriteriaId": "12F8412D-F1D5-4219-8DD3-EBFC1BDF27FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4712hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "E974332C-498F-4183-8CE4-56BF61A7950E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4712mq:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7125D26-367E-45DA-A9B5-562310D8E01E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4720hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3B71011-540B-4C21-8E8F-FDC7AA80B557", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4722hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFDAAA3C-F332-4799-A0B3-952CB076E199", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4750hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "67AB6E17-4975-4D45-9B42-FA2EBAF2D73B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4760hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "0ED0763B-9406-4644-A60A-676B665C9B34", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4765t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5DDE5AC-EB56-47B3-A737-05FC0050BC62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4770:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC81D07E-F6D1-4B75-87BD-5A79F182FC03", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4770hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "B99F445E-2385-46CD-959A-32B95DEF22FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4770k:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5277739-48A8-447A-A730-1C45107182F0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4770r:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC7A7DE5-019C-4FF6-B810-3A5FBB8A9276", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4770s:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A321932-8B3C-49FD-87B2-CCC215A6A2A7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4770t:-:*:*:*:*:*:*:*", "matchCriteriaId": "57585A7D-EF0A-4EF9-8AFE-A5F6AAAC9EF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4771:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ADDCBE6-9148-420D-8DFF-AE6667DB71FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4785t:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADEBD889-5D07-4620-8E80-BEA16E7BEC54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4790:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BF582C2-6958-4060-A49E-AC943678C5A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4790s:-:*:*:*:*:*:*:*", "matchCriteriaId": "CDA7EEAE-64FE-4891-AC8C-019B1242E12A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4790t:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB407F25-0554-4CD0-AC93-FC546EFB52DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4800mq:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D83B6CD-CF5B-47B2-A547-C6EE8F901203", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4810mq:-:*:*:*:*:*:*:*", "matchCriteriaId": "20884D35-BBBA-44A8-BF14-95103C62F72B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4850hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "A14A6ECA-8879-40A2-8E33-156541B4E35B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4860hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "07AD0193-68BC-44E6-99DF-DC266B16A8AE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4870hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "D38873C6-BB11-43A1-8233-7828FF143CF0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4900mq:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E079890-9A4D-4AF2-86F4-3663789105DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4910mq:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9CB4BA0-CA4E-4C45-9A49-92AB0D411A95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4950hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "074C330A-B69B-4414-8B80-E67A6AFEA651", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4960hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "1EDDDFB8-3F05-4912-ABA3-A9F52B6636F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-4980hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "38ECE802-5548-44A8-9777-081C28402AE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C34148EB-C6A7-49DE-8139-316F710D57F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EA33B05-493C-4F55-82D9-5F2C942A603D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5557u:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E8D6B87-CA43-4773-B13E-EB07128E5501", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "80BAD40A-BE40-411C-A5E3-19C264BF4805", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCD85430-4610-41B7-B7BD-CD3AA5391FB6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5700eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA71265A-4E37-4AC6-97D4-ED31D94A35B6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "91CEC4BC-098C-4B8F-AA4F-25B9211010D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5750hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "9453959E-FB00-441B-B9B6-4BC75DD534B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5775c:-:*:*:*:*:*:*:*", "matchCriteriaId": "5ADC848D-C1AF-4FCE-89B4-DD3ABA050202", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5775r:-:*:*:*:*:*:*:*", "matchCriteriaId": "0846BDFE-1643-49BE-8B48-03EC17B9BAC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5850eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "B131EF48-4094-48C4-807E-4A76156A34CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5850hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "466ECE77-E232-4C03-83A2-FBAC06C82021", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-5950hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D98586A-473F-44D7-B299-9480129AE8DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD248D-0B95-4BE1-917F-E0976447927D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "104F999D-584F-4D34-9538-679EDBE3B180", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5726D5D4-F188-4F06-B78A-2C7C694A40E3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*", "matchCriteriaId": "72467515-7793-479B-BABF-839275CA9AAD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56B79264-C756-408C-A32A-BFD4AA0B20CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D3DB891-40F6-4000-BEAE-A1710C70C43D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3EA33F-D137-4B24-9211-C8A62A7427A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "86FFF97C-C121-4F91-B62F-057356B0A048", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "213B09CA-91E9-4D11-AA11-B84F40495E9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAFC55E4-D84D-4588-976D-1E2637B1BF0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCB20762-51C5-44DD-9CEE-FEEC1E9C0E5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAC1A189-D822-405B-A090-B1573FE12B14", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "31C57E58-66E3-4FEC-A88F-B82C4B372B2B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "C173CF7E-81DF-4AD5-AB17-A4C330B933D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "638549EC-1BB1-4206-B8DC-C0101BBEF8A3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8F450DA-5FBA-47BB-9A7D-75873FB3E69F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "112701D9-7154-46E5-BF36-EE36A607C7DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "87B5258B-26E4-4853-9F27-4BB12886CC38", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B1B04E8-A31F-4027-8E05-5461E7855F04", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BDD476-E402-408D-9BD6-886AB195704D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D566CFB-935B-40E4-9F4E-6216A42E7EBA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F8065A9B-4236-44AE-B60B-17F6695A705C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A97ED15-D0C6-4B64-BA08-EE50A6990272", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D57834B-C031-4301-9839-7A32F13687EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEE126ED-B743-4C6D-95FF-04F473A9A008", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D901944-8E2B-41E5-BB82-CF1C97064711", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A13E353-0063-468B-96CD-97BF91C747C9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "913BBEFF-49E7-42AF-A850-B49E5A12AB98", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7740x:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E9EF2F2-750C-4CB7-9858-69D7FFA4EF31", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8C1205B-6AC7-4DB5-B247-2108511D9957", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA47107D-237A-4184-8BA2-601660F7FB5C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9862E49-124E-4B7D-941A-CFD2668B6481", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE6572E2-5B24-4E21-9F6F-3A7A17A9F098", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*", "matchCriteriaId": "85C7AD56-CA31-4C08-A5C1-B50E767E1FFD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8510y:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B8DD6D2-5F42-4E44-A4BB-D3179D83C2BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA0960D2-93EC-4CFC-B901-E38A59B798FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8670:-:*:*:*:*:*:*:*", "matchCriteriaId": "86817715-BF5A-40C8-8250-7A8CD637C05C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8670t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DAAC740C-A02E-4342-8388-B85DDE54DF25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-9700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FB0C1DA-60C6-4C9E-99D6-7A47696DACD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-9700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2EB81B1-7DEF-4CC3-ADC9-A4CB1042E406", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7-9850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D0320CB-05E3-4D5B-BCEF-D862566B0AA2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i9-9880h:-:*:*:*:*:*:*:*", "matchCriteriaId": "659206BB-510A-47F8-8B6E-FD030A6BE1DA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i9-9900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C3257F5-CA55-4F35-9D09-5B85253DE786", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i9-9900kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6F8CEA0-1CD6-4F17-85E3-C1CB04D9833A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i9-9980hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "A48A2969-DC53-48E2-A5CA-4DF2B00D1960", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m-5y10:-:*:*:*:*:*:*:*", "matchCriteriaId": "71AF96FE-EB28-474A-B260-EC22B4A334A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m-5y10a:-:*:*:*:*:*:*:*", "matchCriteriaId": "80F61261-1AF5-4B77-8065-25A6B0AFFEEC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m-5y10c:-:*:*:*:*:*:*:*", "matchCriteriaId": "232B0352-B020-4CAA-A5E3-38E75A157C4C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m-5y3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7CD2FE9A-BFFB-4EC8-9C44-26B2D9911B5F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m-5y51:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0A5C29F-3597-4846-8CEC-74C8C73740C5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m-5y70:-:*:*:*:*:*:*:*", "matchCriteriaId": "091D17D3-213F-4EC7-81C3-CD96AB7BC89C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m-5y71:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F011F80-4FBA-490D-AF5F-F6DDC941CB61", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3-6y30:-:*:*:*:*:*:*:*", "matchCriteriaId": "831048A2-657F-4F2C-83AC-802DF45204A5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*", "matchCriteriaId": "18340F86-5545-4EEF-9F79-6560BB24F277", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m5-6y54:-:*:*:*:*:*:*:*", "matchCriteriaId": "0504478A-E635-4A8B-A3F2-BE0E5908A7AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m5-6y57:-:*:*:*:*:*:*:*", "matchCriteriaId": "7AFFF65E-6576-41A5-82E0-F2EECDC64743", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m7-6y75:-:*:*:*:*:*:*:*", "matchCriteriaId": "E29F8E70-5429-4756-A574-C7B60BE74A86", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_1405_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "C25607D2-8404-4BD1-9E42-7ECE8DCF3E9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_2020m_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "3475F6C6-4E36-44E3-8E84-25ED06B4DB4F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_2030m_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E859E810-7280-464A-AB18-10E6DC6B038D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_2117u_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "3255C643-CD77-446B-B98E-083D2F07CE12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_2127u_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "493C0F33-F0FF-4828-9210-5976F0259D18", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_2129y_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B612898-5BC9-4880-AF5E-F498A9634EFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3205u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB8E1648-C77C-4C8A-BBDF-20468FF3BA00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3215u:-:*:*:*:*:*:*:*", "matchCriteriaId": "779DA292-A24F-42D6-8013-9DFC27BD8C2C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3556u:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EF5B50A-63E4-469B-9D59-A2C7BD6F2E72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3558u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC84C9FF-5E9B-41A1-8FF7-88D3F6687894", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3560m:-:*:*:*:*:*:*:*", "matchCriteriaId": "489DA073-57C8-4904-90B7-F4E94CA34DDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3560y:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8165EF6-316B-4EA3-95C3-F84B0028024F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3561y:-:*:*:*:*:*:*:*", "matchCriteriaId": "00024F21-F6FC-4EEC-BFD4-3723CAD8F8EA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3665u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD0D4FB5-8ABF-40CA-AABC-EF97D8993E15", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3765u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D6920AE-35D7-4A6F-9169-4EC5E7F2902B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3805u:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E24661E-9974-466F-AA8E-C57048DD0978", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_3825u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFB91D35-0E4F-478A-AE1E-7C8645DA51E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_4405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4156AF88-99DA-4331-93A9-07F2049D6B07", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_4405y:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5F17DA0-EAF5-4BE0-B6CE-AE710C3F871E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_4415u:-:*:*:*:*:*:*:*", "matchCriteriaId": "079877E5-12C3-4A37-98F8-443DA366BAB3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_a1018_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "A5E6A6CF-12C1-452E-8450-18BD2D4FD95C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_b915c:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF838448-0E87-4E73-AF51-55302B329E6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_b925c:-:*:*:*:*:*:*:*", "matchCriteriaId": "66D7E11D-B0E7-42BC-8A6F-3B77D08EC79A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2010_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1290CDC-0F8D-4860-85F7-A4B1B40E1F44", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2020_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1110D3C-D880-4D4E-BB68-5A305AD3D5C7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2020t_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1623BCE2-AF99-45B1-B156-E81CE0D89D72", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2030_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C2D72A6-9227-4F44-8243-626AF77A0D90", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2030t_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BBA4425-A154-4F6A-86D1-A05D6FC26963", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2100t_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "311F9683-A58C-42F8-8044-711A7339EF4D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2120_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FADD9066-D903-4B59-A9C1-7987A7663ED7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2120t_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B6C28AE-BAB8-4FC4-910D-A935B26D00E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2130_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "341AB666-177D-47D2-B2BB-70C17400AECD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g2140_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADD28BA3-D5EE-4CA4-8A2B-3DC44BCB400A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3220:-:*:*:*:*:*:*:*", "matchCriteriaId": "A920E6F1-4226-44D1-A86E-43247DBC97E5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3220t:-:*:*:*:*:*:*:*", "matchCriteriaId": "851A04D2-49C2-451C-9CAE-40E98C729EAE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3240:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AB0A5B7-DF08-40B2-B185-0956B2D7379E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3240t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9591F53-E005-4DB6-B162-0DF218919D62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3250:-:*:*:*:*:*:*:*", "matchCriteriaId": "556DC4B9-4302-483F-BA37-2AF4801D5569", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3250t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F71359BA-067C-421B-B647-1D69C8BF7ED0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3258:-:*:*:*:*:*:*:*", "matchCriteriaId": "63002B5D-D73A-4EE5-B0CB-21EDF718E70F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3260:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B9F42F2-D5D7-4220-A327-359D3BF1C09F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3260t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C558DDC0-2998-476D-96B2-54235CEF4AE2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3420:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6090D78-51C8-4295-A4D2-700AD290F745", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3420t:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACFB23AC-680E-4EE1-B9D9-E2B96E3794BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3430:-:*:*:*:*:*:*:*", "matchCriteriaId": "11E3D70C-F003-4A13-A9EC-3810E9585FB1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3440:-:*:*:*:*:*:*:*", "matchCriteriaId": "14403B92-E903-4093-BFAB-F7C639D63862", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3440t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D252FFC3-B059-44DD-A4F9-49B591B4FD18", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3450:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7075CF7-B643-460B-ABF2-9AE24ED68FCB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3450t:-:*:*:*:*:*:*:*", "matchCriteriaId": "631CD42C-4F66-42A7-8F9D-114CF866EBDF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3460:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB7720B3-5489-41B8-BD0A-A6E5A004568F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3460t:-:*:*:*:*:*:*:*", "matchCriteriaId": "988D6BBB-3056-4AC3-8960-5BA6C2F74367", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g3470:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CBCDE97-E95E-4B53-B4C0-19F026A47229", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4400:-:*:*:*:*:*:*:*", "matchCriteriaId": "A85AE2D5-1BA9-45F5-808A-166E27D7D6CE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F142F6EC-F106-4828-B152-13612273A7AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4400te:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF5D3457-C139-499F-8B41-57C8E7E66D40", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4420:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6FEFAF2-7784-4407-B58A-A0B1DA84415F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4420t:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD36DCA7-31D4-4E50-A38C-C437CB2BB439", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4500:-:*:*:*:*:*:*:*", "matchCriteriaId": "63BED4F5-65DE-457D-9BDF-89AA5369304B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C590C99-2770-4D63-9837-D1E1F251675D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4520:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1FC6A24-AF3E-4B7F-9C12-E947C3E4BB1E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4520t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C90F5FB0-7AAD-42F2-9780-E93A82E0C239", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g4540:-:*:*:*:*:*:*:*", "matchCriteriaId": "B207606B-14AD-48D0-8219-A54D2617F067", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E80ABC5-7BAB-41A1-8D61-481A59BD9C21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g5400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A82B8D9-E751-48DA-948C-231ABEE90B54", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g5420:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7706D22-7E16-4068-A467-EE2D4BFAE968", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g5420t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8D28A52-5EE7-42D2-B942-7A341AB00AB1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9ACD1AA7-8805-42A2-852E-C839417B10E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g5500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C55F7F50-61ED-487F-AB1D-70B75D972184", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_g5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AF50627-7830-4984-8F12-7B73C51E5828", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE118AB2-A2C4-452C-B9AD-DDEF65B5EC67", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*", "matchCriteriaId": "43126A13-5931-4989-BEFD-E1A096F98D94", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*", "matchCriteriaId": "342E0783-288A-4DB0-A657-29937903927C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4C40F91-138F-4396-9A6B-B969F6AC30B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*", "matchCriteriaId": "23CA9365-B1C4-4188-A9BF-19215AFF58A0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4797D2E-1270-447B-BFE4-CC96D9F10D5B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA77EB3-6F11-43BC-8B59-84217AA73205", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0866F1A3-8B9C-4B5A-B30D-71B3465EC80A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*", "matchCriteriaId": "331B8F10-3A20-46A8-B960-3546271CF701", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE638E59-DF75-43B1-A6DC-10A838B05B00", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*", "matchCriteriaId": "109FA97C-10EE-41F9-B52B-B37E31642251", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2184g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3FB62DD-090B-4434-9056-09427B66AAF0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67B3834-E59E-47AF-A806-13A990E812B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*", "matchCriteriaId": "79214F8B-1090-4DCD-B1F4-0FF78FC29C4A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD176FB0-7427-4F2E-A969-72062BB3EF98", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B278081F-F900-4581-9D10-B5A2ACD2E2C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*", "matchCriteriaId": "45689B37-5085-41B3-BA9D-F05FD07DF1FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7186EA5-448F-473A-8FC8-058FC823ACC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*", "matchCriteriaId": "C12F0C71-8F25-4C77-A3F3-1231AC53C0CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB179A6F-FED8-45FB-89C7-3B17D6F5EB21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*", "matchCriteriaId": "F58AEEB9-919B-4C6C-83B6-080846786A56", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0BAE174-A158-4807-9D67-36F795028D76", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD38AEA-979D-484B-82F0-0161BA39E9F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*", "matchCriteriaId": "780AB9F4-0C87-4528-B53A-69FBC4D87ADB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2CA54AE-915F-45B9-B775-C04589E49802", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB86F018-1F56-4146-A78E-C7BF7B616023", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*", "matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "00912C9C-D386-445E-B390-E96361ECDFA6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*", "matchCriteriaId": "60B582A1-784C-4BE8-A0D5-706DE01D769E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2284g:-:*:*:*:*:*:*:*", "matchCriteriaId": "56F30E1A-8EF1-4C90-974C-791312241BCA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*", "matchCriteriaId": "556637E1-9502-41E7-B91D-082C92F233A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1105c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E70E7B6B-C4B6-4864-939A-A0D8D648C661", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1105c_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "09BD9ADD-4FBE-4A12-A5F0-594B93824671", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1125c:-:*:*:*:*:*:*:*", "matchCriteriaId": "97560433-94FE-44AC-98B6-E371C878162A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1125c_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E82681A7-C9A8-4CCD-A19A-B4D53343B34F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1220_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A2BF613-A53F-437A-A483-564BB4D8CC96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1220_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0493CF98-1A11-41D2-B719-6D94583232E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E629CF7-A706-4DD3-B3EB-A1F9711B0372", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFD11A3F-A2D4-4B09-84D2-548F97268805", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1220l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "72953F49-8FB3-4D07-A1F9-96D682348679", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1220l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF9C696B-FA4E-419C-B036-76DCBBD9022C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1221_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "92ABFE16-E712-4805-8DAC-AA17C5214631", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1225_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E8C4032-40A3-420E-BE9D-ADA27443535B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1225_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "771E2F3E-3FC2-462E-93C4-12301660E6C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1BCDBDF-A902-43A8-94A8-13541FB8CB32", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E031BE7-87C6-4E4B-8988-020221ECAEE7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1226_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "58BEE344-48BE-4D5E-B5BE-9391255C8550", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1230_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADF68144-22B0-4B0E-A73D-6FE38C213C71", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1230_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "67A9DE3D-FA10-4C8A-952F-979DE9B19AA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CC1EDA9-6CB8-4643-AC65-76B892319879", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "49C57129-0A27-4142-BF6E-68A558773573", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1230l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "73B301CD-6105-448E-B013-52F894D8106E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1231_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE531899-3AB8-4540-9099-BE4A0FB75EAF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1235_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B86BD818-70F8-409B-AB96-53CCF490B7FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DB4F8D-E42C-4119-83BD-44D6AB9319B0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7FB452F-4FFE-449B-9846-198A61B1F521", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "231327DF-C1E2-469F-9C5C-25B14541F3AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "51E0227B-8F2B-48B3-97BC-73BA1BACEED8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5EFEF14-4ECB-45C9-8911-01FD7B115D7B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6A3E845-3883-4034-B90B-3ABB61BBD1D0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8BD1F0B-7B75-4A5A-A708-BDE56D237354", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1241_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BE15F08-0B49-486A-808F-5B647142F093", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1245_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C661F8C-0F1B-4A0B-9B0F-A845883BA3D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1245_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "15236325-68D7-4D7F-B500-A79AD02812CE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE01A935-4048-4578-8FBA-1D12A95654D1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "333364EE-BF57-4217-9517-2C1B95B826CC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1246_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB7C3F31-16F9-4177-B7F2-B865010A6EDB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1258l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB35FC19-9CDC-46EB-87D5-F2418F16B548", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D45FCBB-CC03-40A8-ADCE-7AE0A7AA05A4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1265l:-:*:*:*:*:*:*:*", "matchCriteriaId": "DC84425F-C08A-4188-82B9-E56F22DFA17D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1265l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2F157D9-5288-42FA-943C-53F0D227590A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1265l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F3FD78E-7790-4CFD-88F2-46889CBE1BF4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1268l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0BB6C08-9816-4F79-A91D-84B7E365D586", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "28D7D164-E631-4D49-B87A-0B7885148790", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1270:-:*:*:*:*:*:*:*", "matchCriteriaId": "23544F02-3847-4089-97F1-8C29B5596B9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1270_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "251A501D-9744-49A7-88E8-035C239B06C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA74EB5E-3D7D-4E5A-8D7D-AF902F8BCF8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F2476F2-6A8B-442F-B054-738F36613CE2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1271_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F1E851-0C83-466B-A89D-03486BD90CC0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1275_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "000FB0C9-0642-48D1-94CC-A035145963AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1275_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "98FA6E45-B945-4923-84FD-B34F2CAA15C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A10975-3375-4FB3-A008-56EB2ACD2737", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BC9CEA2-C621-4DCF-B64C-5495D3208DB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1275l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "565C5D54-D6C2-4387-AA45-F18C4DC344FE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1276_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5516A1EB-1A09-4248-A1E0-6438751DA0AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1278l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4E19F29-3E2C-4F0C-A887-07E68D1EFB3F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1280_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "CC228684-3F7B-477F-A010-66CD28B64ACD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1280_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "99848B67-F10E-4DD0-B394-A30463EF0E0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6A99895-6A48-4A44-B0F7-7BED55C677FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "A32F3CD6-6BA6-40E7-9580-3C1A455B3C99", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1281_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FC720A2-BD40-4FF7-ADE3-52430B263AD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1285_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4FBE620-5CA2-45B6-9CD9-15928146F23D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1285_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A656CC1F-943D-4B35-931C-CFBF8F3110B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2559D24-F8AD-4202-A00D-F48D51A0940A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1285l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "3391CFE3-DDED-406A-8126-416C29E20A34", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1286_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "88DDE104-1102-4847-AF28-55A380E8C4C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1286l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "53E830C3-BCD4-45F1-8D00-0DE7959F4369", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1290_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "37C7A319-3FB2-460D-AF17-D70903EC53DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "37AF4F98-0672-4101-9825-57B0F64EDBEE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "2231374F-222A-4BA3-B14D-F69860668F7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "057E3667-7BA8-4142-8A1E-B957333D776A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "31BF874F-B640-4A18-AC92-F0E16AB7E1C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "84A77114-92C8-48C4-9D12-3ACC3030D5A3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "542BC61B-1EA3-4C42-BB99-C9C67EE82F7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "13B5BF22-5E95-46A4-AF05-450CFD1312C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "9490F926-AD57-40F3-A523-61D67486DCB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA12E60-4B0A-4723-8A02-3115494CD1DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "29CC9B92-CF59-4121-9638-F4D4521952D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC6592D-743B-4656-B1C0-247F36ABE5CA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCC32129-C5DC-4D26-96D5-219F5291D6F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "81F4426C-970C-49DB-950B-3F5ED17E682A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4ADED698-2702-479C-A24E-E9E6F35E9AFE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "D86C0CFB-72A3-4446-9601-2C956C9A71F4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3C578D9-8973-4F36-8BA4-9F4F3A8E0AE6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*", "matchCriteriaId": "B620311B-34A3-48A6-82DF-6F078D7A4493", "vulnerable": true }, { "criteria": "cpe:2.3:o:opensuse:leap:15.2:*:*:*:*:*:*:*", "matchCriteriaId": "B009C22E-30A4-4288-BCF6-C3E81DEAF45A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*", "matchCriteriaId": "8D305F7A-D159-4716-AB26-5E38BB5CD991", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*", "matchCriteriaId": "A31C8344-3E02-4EB8-8BD8-4C84B7959624", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:20.04:*:*:*:lts:*:*:*", "matchCriteriaId": "902B8056-9E37-443B-8905-8AA93E2447FB", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*", "matchCriteriaId": "80F0FA5D-8D3B-4C0E-81E2-87998286AF33", "vulnerable": true }, { "criteria": "cpe:2.3:o:fedoraproject:fedora:32:*:*:*:*:*:*:*", "matchCriteriaId": "36D96259-24BD-44E2-96D9-78CE1D41F956", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "496228A2-6907-4970-BEDC-E9B44CBF7CCD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADAD919-32C1-49D2-A419-C9A803DB6250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F5320759-AAAB-4FEA-99AB-51A7F7EE9F58", "versionEndExcluding": "22.01.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "36E7D51E-4657-4594-BBD3-F98E3E50F4E1", "versionEndExcluding": "26.01.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc347e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C9830BAC-C836-4D00-8E21-28F180A59163", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc347e:-:*:*:*:*:*:*:*", "matchCriteriaId": "49D276DE-950F-4A61-BA13-DD5D07A17571", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6A2E4F1-7402-4EF2-8559-B9318A01C008", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*", "matchCriteriaId": "46CC8AFE-ED6C-4A50-AC80-D2309E03FAE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "77B3A9A8-2AE8-4938-9114-BE75DDBB6A1D", "versionEndExcluding": "21.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A946EA63-4FA9-44B8-97F4-E53A5DAADE46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*", "matchCriteriaId": "754A6744-5194-4A99-BD3B-944A8707C80F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AF94A909-1192-41AD-9717-EC88B30B8DCF", "versionEndExcluding": "21.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7011395-6ACF-4FC5-AF8F-971427128D27", "versionEndExcluding": "21.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "65A6E7CD-4AEA-465D-89B3-6EF66E4F17B6", "versionEndExcluding": "1.4.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*", "matchCriteriaId": "55156889-E9DA-4F04-B894-339DC39CA942", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6A15ED1-124A-4642-988F-890FF4162346", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DD4A97-1648-4C7F-A5A0-6899BD13A617", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "03F52E28-42B0-444F-892D-749B9A7EC498", "versionEndExcluding": "r1.28.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A30CB799-FF9A-4E4E-A3C6-EB12CE2EB5B0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "1291471D-D36E-4ACF-A912-76697396CDE1", "versionEndExcluding": "25.02.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "43337EC1-0BF8-40B3-88BC-38F06EF48DC6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7CAAF2D6-7799-4BB7-A151-561E8AB260DA", "versionEndExcluding": "25.02.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "7FCA9FA2-AA26-46A3-9E2D-3C87BC2BE0F3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F4DF4B0B-F376-472B-83E0-1B7E5F87EF6A", "versionEndExcluding": "25.02.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3A03BCCF-9EF5-4353-8886-15DFE6A35765", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D87239-40C1-4038-B734-D77AC4DDD571", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "681C8A24-C3AC-4CF4-8283-DAC337909CC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F37D88-E086-4060-8420-BD0F8D8FF580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E63A5F2-8767-4E25-8785-F8F197B77F7A", "versionEndExcluding": "25.02.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc3000_smart_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD3F04ED-C6D0-4387-BB3A-31C86B1F918F", "versionEndExcluding": "1.b", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc3000_smart:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "DD37AB3C-6E1A-4E8D-A617-4D97B4501A28", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4ABF49D4-34CE-4DEA-AA2E-A40A53472D1F", "versionEndExcluding": "23.01.08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_p320-4e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F66E1293-5598-4A7D-8523-951F62080B22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_p320-4e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EE09494-625A-4FF7-8B3E-6510FF9AFC9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_p320-4s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D77F8F19-06C8-4B8A-8436-26508B2277DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_p320-4s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A49883F4-8360-4895-8E9E-B274A35BDE57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:threat_intelligence_exchange_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "E26D80A2-E490-44B6-A8D2-1AEF487E72B2", "versionEndIncluding": "2.3.1", "versionStartIncluding": "2.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mcafee:threat_intelligence_exchange_server:3.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "A0F26126-55C2-4E2E-A586-D93FF38ABF6F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Incomplete cleanup from specific special register read operations in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access." }, { "lang": "es", "value": "Una limpieza incompleta de operaciones de lectura de un registro especial espec\u00edfico en algunos Intel\u00ae Processors puede permitir a un usuario autenticado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso local" } ], "id": "CVE-2020-0543", "lastModified": "2024-11-21T04:53:42.440", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-06-15T14:15:11.207", "references": [ { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/14/5" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318" }, { "source": "secure@intel.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/" }, { "source": "secure@intel.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/" }, { "source": "secure@intel.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/" }, { "source": "secure@intel.com", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4385-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4387-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4388-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4389-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4390-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4391-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4392-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4393-1/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00025.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00024.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00031.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/07/14/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-534763.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10318" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DT2VKDMQ3I37NBNJ256A2EXR7OJHXXKZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRFC7UAPKAFFH5WX3AMDUBVHLKYQA2NZ/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NQZMOSHLTBBIECENNXA6M7DN5FEED4KI/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T5OUM24ZC43G4IDT3JUCIHJTSDXJSK6Y/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4385-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4387-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4388-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4389-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4390-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4391-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4392-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/4393-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00320.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-459" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-03 01:15
Modified
2024-11-21 05:34
Severity ?
Summary
A vulnerability exists in System Management Interrupt (SWSMI) handler of InsydeH2O UEFI Firmware code located in SWSMI handler that dereferences gRT (EFI_RUNTIME_SERVICES) pointer to call a GetVariable service, which is located outside of SMRAM. This can result in code execution in SMM (escalating privilege from ring 0 to ring -2).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20220222-0005/ | Third Party Advisory | |
cve@mitre.org | https://www.insyde.com/products | Product, Vendor Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20220222-0005/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/products | Product, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:5.12.09.0074:*:*:*:*:*:*:*", "matchCriteriaId": "1506F007-8D5A-4F89-9C20-39C956E5E330", "vulnerable": true }, { "criteria": "cpe:2.3:a:insyde:insydeh2o:5.23.04.0045:*:*:*:*:*:*:*", "matchCriteriaId": "0D71B9DC-9A25-4395-9369-E746B0BCFAD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:insyde:insydeh2o:5.23.45.0023:*:*:*:*:*:*:*", "matchCriteriaId": "DB7F094E-CE8C-44EB-AA8F-04FE034C0D02", "vulnerable": true }, { "criteria": "cpe:2.3:a:insyde:insydeh2o:5.33.15.0034:*:*:*:*:*:*:*", "matchCriteriaId": "7F636FC4-E44B-49ED-96E4-BF7187F3344C", "vulnerable": true }, { "criteria": "cpe:2.3:a:insyde:insydeh2o:5.34.03.0029:*:*:*:*:*:*:*", "matchCriteriaId": "D24FF36C-7E38-4EAA-80B2-299AF22619FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:insyde:insydeh2o:5.42.03.0010:*:*:*:*:*:*:*", "matchCriteriaId": "8822BCEE-BFF7-4691-A0F0-C2CB04BE2354", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ruggedcom_ape1808_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDCA69-9049-40B4-88AF-F476901022B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ruggedcom_ape1808:-:*:*:*:*:*:*:*", "matchCriteriaId": "B89A6863-B602-4404-8D26-337FECABFFF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECC5341D-9982-4F18-9C8D-2912DDB8EF9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc127e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "846EE524-BC53-4DE5-81C5-6B5EB2DD8BEA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F63C0B17-60E2-4240-92FD-4B7C7D8F2C8B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc227g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED11E5B-E60C-4359-B87C-E373DED77677", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D1E85AC-1305-4C5E-AD8B-39B2654F6057", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc277g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1865061F-CF02-410B-B01B-2088F7104867", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*", "matchCriteriaId": "320F5752-86B3-4C08-89D0-02272753A6D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "64538703-AE66-4D4A-B4A1-C88039B9543D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AD30972-8CE2-46B4-A4B8-B209F6B616AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFA7953-DC4C-489A-B5A4-B832FAF3C143", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC414E9-5DBD-4D60-B0EA-6FB48207B628", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "193BF353-5D85-4F2E-94D0-329ED823FF07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8CE311F-98F9-4E58-9E52-BAFAF87C0819", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc327g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68215EEF-243A-4B02-BEAB-C162A3564D60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC7303D1-CC95-42C7-B843-C3B3B3336669", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc377g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62751FE8-48D7-4D7B-A7DD-4977DE539660", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDD6F034-BC50-4223-AE5D-319F04C866A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EC3A82C-1380-4B21-BB17-3760A0B6A027", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2558478-44E0-4D42-A6DC-D4262D15A92A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "75AE72A3-05C6-4564-81CC-67865D03D106", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability exists in System Management Interrupt (SWSMI) handler of InsydeH2O UEFI Firmware code located in SWSMI handler that dereferences gRT (EFI_RUNTIME_SERVICES) pointer to call a GetVariable service, which is located outside of SMRAM. This can result in code execution in SMM (escalating privilege from ring 0 to ring -2)." }, { "lang": "es", "value": "Se presenta una vulnerabilidad en el manejador de Interrupciones de administraci\u00f3n del Sistema (SWSMI) del c\u00f3digo del Firmware UEFI de InsydeH2O ubicado en el manejador SWSMI que desreferencia el puntero gRT (EFI_RUNTIME_SERVICES) para llamar a un servicio GetVariable, que es encontrado fuera de la SMRAM. Esto puede resultar en una ejecuci\u00f3n de c\u00f3digo en SMM (escalando el privilegio del anillo 0 al anillo -2)" } ], "id": "CVE-2020-5953", "lastModified": "2024-11-21T05:34:53.567", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-03T01:15:07.647", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0005/" }, { "source": "cve@mitre.org", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.insyde.com/products" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Vendor Advisory" ], "url": "https://www.insyde.com/products" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-10-01 03:15
Modified
2024-11-21 06:09
Severity ?
Summary
A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20220216-0006/ | Third Party Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge | Vendor Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge/SA-2021001 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20220216-0006/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge/SA-2021001 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A8D4515-2E1D-4C69-B561-6F42B54FFD74", "versionEndExcluding": "5.34.44", "versionStartIncluding": "5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "38BBAD45-A06D-41D6-A1CC-5AD560E9DCB8", "versionEndExcluding": "5.25.44", "versionStartIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "816E66FC-0597-4442-9257-69B97D27D815", "versionEndExcluding": "5.16.25", "versionStartIncluding": "5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "A889306B-C22C-4F29-BDBC-08B86252A584", "versionEndExcluding": "5.42.44", "versionStartIncluding": "5.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "C47A7464-4682-474D-B094-CB6F2BD3B6B4", "versionEndExcluding": "5.35.25", "versionStartIncluding": "5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AECE476-8649-4928-9702-9E9737E1A764", "versionEndExcluding": "5.26.25", "versionStartIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C8173E6-4FED-481D-BF5E-3CABDF13CA61", "versionEndExcluding": "5.43.25", "versionStartIncluding": "5.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ruggedcom_apr1808_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E08DFAD2-130C-4B75-B7EF-602C4B3324F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ruggedcom_apr1808:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD56E8B2-232B-4E1C-BB3F-41B0C1E31D7B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "75AE72A3-05C6-4564-81CC-67865D03D106", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECC5341D-9982-4F18-9C8D-2912DDB8EF9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc127e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "846EE524-BC53-4DE5-81C5-6B5EB2DD8BEA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F63C0B17-60E2-4240-92FD-4B7C7D8F2C8B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc227g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED11E5B-E60C-4359-B87C-E373DED77677", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D1E85AC-1305-4C5E-AD8B-39B2654F6057", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc277g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1865061F-CF02-410B-B01B-2088F7104867", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*", "matchCriteriaId": "320F5752-86B3-4C08-89D0-02272753A6D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc327g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68215EEF-243A-4B02-BEAB-C162A3564D60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC7303D1-CC95-42C7-B843-C3B3B3336669", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc377g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62751FE8-48D7-4D7B-A7DD-4977DE539660", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDD6F034-BC50-4223-AE5D-319F04C866A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EC3A82C-1380-4B21-BB17-3760A0B6A027", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2558478-44E0-4D42-A6DC-D4262D15A92A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AD30972-8CE2-46B4-A4B8-B209F6B616AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFA7953-DC4C-489A-B5A4-B832FAF3C143", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC414E9-5DBD-4D60-B0EA-6FB48207B628", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "193BF353-5D85-4F2E-94D0-329ED823FF07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8CE311F-98F9-4E58-9E52-BAFAF87C0819", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "64538703-AE66-4D4A-B4A1-C88039B9543D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability exists in SMM (System Management Mode) branch that registers a SWSMI handler that does not sufficiently check or validate the allocated buffer pointer(QWORD values for CommBuffer). This can be used by an attacker to corrupt data in SMRAM memory and even lead to arbitrary code execution." }, { "lang": "es", "value": "Existe una vulnerabilidad en la rama SMM (System Management Mode) que registra un manejador SWSMI que no comprueba o valida suficientemente el puntero del buffer asignado (valores QWORD para CommBuffer). Esto puede ser utilizado por un atacante para corromper los datos en la memoria SMRAM e incluso llevar a la ejecuci\u00f3n de c\u00f3digo arbitrario" } ], "id": "CVE-2021-33626", "lastModified": "2024-11-21T06:09:13.410", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-10-01T03:15:06.593", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220216-0006/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2021001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220216-0006/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2021001" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-829" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-09 19:15
Modified
2024-11-21 05:39
Severity ?
Summary
Improper buffer restrictions in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32 and 15.0.22 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "8D41935E-7A95-4D3A-AC89-9FB81BF18AC0", "versionEndExcluding": "12.0.81", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:b360:-:*:*:*:*:*:*:*", "matchCriteriaId": "0829C549-51C2-4029-9623-51D0C5470FBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:b365:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CC7A911-2CFA-44B3-9B5D-824C02A92D1C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7FDE41F-FF2A-42F0-AF4D-F57A28E377F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AB420EA-D647-4272-8A96-2A09E70FAEAE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_4205u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6910BDD0-4968-45AE-AD19-3A1206F5D068", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_4305u:-:*:*:*:*:*:*:*", "matchCriteriaId": "14C91CFB-C318-4F06-9A01-DCCEE2E901B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_4305ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5C0F89F-0C58-44B8-A02C-50A97B086659", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*", "matchCriteriaId": "70EAC725-DC8A-4DA9-8B01-0465EBE86D6E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*", "matchCriteriaId": "25227F52-7398-4E68-A973-B9177886BE0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "B230FB82-C498-4118-97D3-3835CB713E87", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A205DBD9-A841-446A-8ED8-57989B806518", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFEF82DB-59F7-4530-B3CC-3D417CD519B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*", "matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*", "matchCriteriaId": "73DA1253-1652-417A-BE27-586EF8ED59F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "790A7B55-AD96-4B1C-A31A-C6778BFD5CC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*", "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h310:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DD64A3C-6925-4715-9D55-F1FC8AA0BB95", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h370:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7D83701-E7FF-41D3-ACC6-C78519E34FBD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:mobile_cm246:-:*:*:*:*:*:*:*", "matchCriteriaId": "6574448C-E901-4E96-AC27-51ED5514E15F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B485AC9-B986-4100-90CC-E4BC9B1AAFD1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F76BE235-C991-43BB-B145-239D95084BC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6748F85C-A99A-4380-B01A-A51DBD43AED9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*", "matchCriteriaId": "421F0AF2-5F41-4F0C-A909-D76D72AB5FCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C04332C1-9652-44ED-BD97-5A6AD0A4E6B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D376C32-99BE-4DF4-A63D-2156D10EEA73", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE118AB2-A2C4-452C-B9AD-DDEF65B5EC67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA0D6C21-7DCE-4F8C-9394-D0006695550D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD6B51B5-96AA-44C8-9539-9D7F67143DC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB78854-1E03-48F3-BC86-B0934641B47E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D3350F-8083-4FD3-9432-36C10EE911EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB28789-A195-4EB8-AE96-6E1EFEE93E6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C96A17A-44EE-4FD0-9187-9BB9202AA9C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D6425C6-A338-42A0-B236-12B33147931D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF3F6453-51EF-4509-94CB-24E8ECFBAC5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4861FF06-6720-4E5A-B599-F7F96D7D4FE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF098E89-4979-45DB-AF4C-A5D0F5CE6F67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "A263FA56-5F1F-4E91-A354-38648E130685", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*", "matchCriteriaId": "102AFB09-B4EC-456C-899A-A9ABDA120D54", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D24E8214-881A-4C15-A544-FB3FD5D14DCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*", "matchCriteriaId": "02454A49-0345-4927-89DF-7A37C25E4E11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1EDE72E-3734-4FB5-BC77-B7C3838D41F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E07450B-D81B-474D-9150-C9D8A62D44A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A892B60-7FD3-41A6-9997-586B76757416", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4701D592-F06C-4713-9736-19DB130B5E2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3E6063A-23C9-4845-B575-5D330B6C68F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D50C73A4-D52E-4560-B725-61F416E18505", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "25570E2C-BBE9-402F-9631-FA5014767CE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*", "matchCriteriaId": "D59D57C2-CFB5-486E-A340-E63C7D7A8B6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q370:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CD6D64A-BC68-458E-810B-9EEDFD35817A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*", "matchCriteriaId": "853DE44A-84C9-4959-865F-D538DF895647", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*", "matchCriteriaId": "13326C69-C160-482F-BF28-5425B57BE738", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07040D2-2ADC-4CC4-860F-74A7C64FD6FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F66D2E5-BD5B-406D-82A0-4E1E32EDC337", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*", "matchCriteriaId": "557E240A-6760-434E-9C3A-1E5E9129912D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D196C46-0F17-4C42-A232-B12CE85D9641", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B7565F3-5D41-4A1F-948B-1A55E3AD3EF8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3B40170-C992-4386-8429-52A216F64384", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*", "matchCriteriaId": "C71A52C1-1FBF-4730-8234-700F87D5E74D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9219B34E-F94C-4ECA-85E5-850EBD0F41A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1270p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B930DF9-C425-41AF-9736-0BD611C79CA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCD02FD9-8E63-4B79-8878-07C4316981C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DF260A0-CDD8-4EE1-B3F4-73CD02FDCD11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B84F7DC-EE67-4748-8AE2-7070A6F79BAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C156433-48A3-4B2E-A8DB-AF1F09B2EFA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D78A1CFF-F05E-429C-A9AA-935078574A3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE28AD41-2287-4F2B-924C-30B66A320443", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:z370:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD09C370-3A22-4AFD-89D7-C35B152C4DE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:z390:-:*:*:*:*:*:*:*", "matchCriteriaId": "9379A170-4752-49F2-941D-75D88D385966", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "820A8ADD-5177-4EEB-BB28-79C9A0F519B9", "versionEndExcluding": "13.0.47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E40B89C2-49CD-4216-9D4C-79695698EAAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F751905-287E-47EA-93B8-2BA576052AAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*", "matchCriteriaId": "614B1B4E-E1D7-417F-86D1-92F75D597E36", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BD11E86-B786-43C8-9B67-8F680CC30451", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D740D69-83B6-4DBF-8617-9B1E96DFF4FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9963C9F-2D15-479A-A6C1-0C9863904B7E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8B15567-BFEA-43BE-9817-98A1F5548541", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*", "matchCriteriaId": "984C7C7A-2F8E-4918-8526-64A080943E0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", "matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*", "matchCriteriaId": "43454510-4BE7-4CD1-960D-AE1B36EFBEA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7AFC285-2248-45E7-9009-1402628F17E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "078DAE1F-8581-44FB-83EA-575685928C4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*", "matchCriteriaId": "887BEC29-AD0D-4BEB-B50B-F961629BBF23", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*", "matchCriteriaId": "93859A03-DE41-4E7B-8646-93925ACBFC42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*", "matchCriteriaId": "9877F278-641B-4F83-B420-AB4E1018EA9E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "403E8A3A-28C2-4329-BF31-1A530E317959", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "7824FB5D-4401-4785-BD6D-4A8E67434217", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6F3DE58-EC72-429F-A223-F2027D2828AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E6B9500-2C37-48D5-A0BA-A159D04AC6CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BF497A0-30BC-42A4-A000-C0D564D4872A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3025301-52D3-43D7-B6AB-F3F0A5C882DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9466A6CC-8D69-4EB5-94E2-611297120462", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2D116C4-698B-45BC-8622-87E142B37922", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AFE4FE7-AA7E-425E-AF51-2FCB3E4E6C11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DCA6E61-F1C9-4629-9068-545B19CF95E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "36836EB0-99DD-4217-9182-1E9FC5656C42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD507601-CD6D-4F11-A4A7-790FB740B401", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C26205-C602-46F6-B611-424709325D6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "464587A0-9EAA-4DF5-AFEB-15F2FA9CD407", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "1940F59A-67FD-45F9-9C78-51A50687628F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B722E2A-1262-44FD-8F7C-F9A9A5C78744", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BC3C45C-FACC-4890-992F-449DF6F06E11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA08C262-414E-401A-8F91-131626FA82A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1978F85-5BA5-468E-B797-7FA7EB4F489D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8D3D0CA-C981-4091-99F9-203DA8F156F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB23D0C-D2BC-4E7F-94AF-CAF171A64307", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CC9312B-40A7-4D4A-A61C-3BA865C29F63", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EBECBE5-2BF0-4175-81CC-C6D054C819B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB33CC4F-9D51-4A11-B063-6E78F0D71555", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", "matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", "matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", "matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*", "matchCriteriaId": "39F9F143-0AB4-4302-82B8-B4EA790EB08D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE73B0A0-E275-449D-8ADD-86AE188DE82A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE06C64A-1610-4340-98CF-AC91258AB215", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*", "matchCriteriaId": "C27F79F3-EA0A-429C-8DA9-BC276A94AFB7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*", "matchCriteriaId": "B07609EB-E10B-4253-938E-81566036D81B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC44D69-AAAB-4524-9D12-F1A606D57831", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D23D2887-1246-4EA4-B8B6-57BC7FB869E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEFC46D5-B23D-4513-9669-4DC53662F87B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52310FF-8235-4081-B679-CA56C0361B1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D264277-00CB-4FCC-ADAA-38536609D0F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "1FF33336-6175-417A-B0E0-F50BD7F9705B", "versionEndExcluding": "13.30.17", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3_l13g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "024630A7-07FD-4FCD-8F1C-8416BD4BE48A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5_l16g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CBFEB46-F34E-4A5B-BC67-9248C777EB7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "55D4F5A0-E660-4D21-8F13-B857F6AEAA05", "versionEndExcluding": "14.1.53", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:b460:-:*:*:*:*:*:*:*", "matchCriteriaId": "DFB47F1D-AE3D-4F0E-AEFE-879140B47DD5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1000g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DAA00D4-A8AA-44AA-9609-0A40BD4FB2E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1000g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF64D95C-653A-4864-A572-CD0A64B6CDF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1000ng4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E40B89C2-49CD-4216-9D4C-79695698EAAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1005g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "30B2F570-1DD9-49C7-BB72-0EA0E9A417C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100:-:*:*:*:*:*:*:*", "matchCriteriaId": "1DA9CBE9-CF87-495B-8D80-5DDDCD2044B6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100e:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F751905-287E-47EA-93B8-2BA576052AAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100f:-:*:*:*:*:*:*:*", "matchCriteriaId": "614B1B4E-E1D7-417F-86D1-92F75D597E36", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BD11E86-B786-43C8-9B67-8F680CC30451", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100te:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D740D69-83B6-4DBF-8617-9B1E96DFF4FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10100y:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9963C9F-2D15-479A-A6C1-0C9863904B7E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10105:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BB09ACB-EFFF-4C2F-BEB5-AE1EEDC1EC2E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10105f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8B15567-BFEA-43BE-9817-98A1F5548541", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10105t:-:*:*:*:*:*:*:*", "matchCriteriaId": "984C7C7A-2F8E-4918-8526-64A080943E0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10110u:-:*:*:*:*:*:*:*", "matchCriteriaId": "44BF0AFB-E9DC-4EA5-BFFF-48F896C655E0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10110y:-:*:*:*:*:*:*:*", "matchCriteriaId": "43454510-4BE7-4CD1-960D-AE1B36EFBEA5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10300:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7AFC285-2248-45E7-9009-1402628F17E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "078DAE1F-8581-44FB-83EA-575685928C4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10305:-:*:*:*:*:*:*:*", "matchCriteriaId": "887BEC29-AD0D-4BEB-B50B-F961629BBF23", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10305t:-:*:*:*:*:*:*:*", "matchCriteriaId": "93859A03-DE41-4E7B-8646-93925ACBFC42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10320:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FD8BD84-B6F9-48D5-8903-2C56C12EFFEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-10325:-:*:*:*:*:*:*:*", "matchCriteriaId": "9877F278-641B-4F83-B420-AB4E1018EA9E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10200h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB69A6F1-9B4D-4CDA-8388-E7FCBB2163DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "71615EAF-4DF4-4B9E-BF34-6ED0371A53D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "376B6DD7-1284-4BD9-88A4-5C34303CC5D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "403E8A3A-28C2-4329-BF31-1A530E317959", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1030g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "F5F6F725-217C-48FF-86DD-E91A24156121", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1030g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "365696BF-CE3D-4CE6-92A8-413DDE43774E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1030ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "7824FB5D-4401-4785-BD6D-4A8E67434217", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10310u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6F3DE58-EC72-429F-A223-F2027D2828AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8515D29-3823-4F9B-9578-8BB52336A2A7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g1:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE048AEB-094D-4102-9DBF-488FEB53FF89", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3907FA31-6F1A-45BA-ACF3-1C8EE05D9BA0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1035g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D48D9F5F-95BD-4F6B-8A37-D1CAA7D2DB25", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1038ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E6B9500-2C37-48D5-A0BA-A159D04AC6CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BF497A0-30BC-42A4-A000-C0D564D4872A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400f:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3025301-52D3-43D7-B6AB-F3F0A5C882DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B2A62F5-A8DF-4565-B89F-9C58B1FB8D94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9466A6CC-8D69-4EB5-94E2-611297120462", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2D116C4-698B-45BC-8622-87E142B37922", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AFE4FE7-AA7E-425E-AF51-2FCB3E4E6C11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DCA6E61-F1C9-4629-9068-545B19CF95E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "36836EB0-99DD-4217-9182-1E9FC5656C42", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10500te:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD507601-CD6D-4F11-A4A7-790FB740B401", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10505:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C26205-C602-46F6-B611-424709325D6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600:-:*:*:*:*:*:*:*", "matchCriteriaId": "464587A0-9EAA-4DF5-AFEB-15F2FA9CD407", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "1940F59A-67FD-45F9-9C78-51A50687628F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B722E2A-1262-44FD-8F7C-F9A9A5C78744", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-10600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DEFF6A7-0DE2-4BEE-80DC-BBAB259647AB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BC3C45C-FACC-4890-992F-449DF6F06E11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA08C262-414E-401A-8F91-131626FA82A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1978F85-5BA5-468E-B797-7FA7EB4F489D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8D3D0CA-C981-4091-99F9-203DA8F156F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB23D0C-D2BC-4E7F-94AF-CAF171A64307", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CC9312B-40A7-4D4A-A61C-3BA865C29F63", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EBECBE5-2BF0-4175-81CC-C6D054C819B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB33CC4F-9D51-4A11-B063-6E78F0D71555", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", "matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", "matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", "matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10850k:-:*:*:*:*:*:*:*", "matchCriteriaId": "39F9F143-0AB4-4302-82B8-B4EA790EB08D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10885h:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE73B0A0-E275-449D-8ADD-86AE188DE82A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE06C64A-1610-4340-98CF-AC91258AB215", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900e:-:*:*:*:*:*:*:*", "matchCriteriaId": "C27F79F3-EA0A-429C-8DA9-BC276A94AFB7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900f:-:*:*:*:*:*:*:*", "matchCriteriaId": "B07609EB-E10B-4253-938E-81566036D81B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B7AEF3-7A62-43B2-8F0C-70E5A2CDB29A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC44D69-AAAB-4524-9D12-F1A606D57831", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D23D2887-1246-4EA4-B8B6-57BC7FB869E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900te:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEFC46D5-B23D-4513-9669-4DC53662F87B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10910:-:*:*:*:*:*:*:*", "matchCriteriaId": "B52310FF-8235-4081-B679-CA56C0361B1B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10980hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D264277-00CB-4FCC-ADAA-38536609D0F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h410:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE191F8B-AC43-431E-87F7-46E2EF211D27", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h420e:-:*:*:*:*:*:*:*", "matchCriteriaId": "C530D5AA-7480-45A7-BF06-45BF95B96B22", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h470:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D7E83B0-4902-40CF-9B24-3358846186E8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q470:-:*:*:*:*:*:*:*", "matchCriteriaId": "61E425A8-F0F9-4C38-B199-0A410F0D0270", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q470e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F945B90-257C-4DCB-9CB3-F34C6F6529D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:w480:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5AE97F1-0236-4305-BC0B-253160262125", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:w480e:-:*:*:*:*:*:*:*", "matchCriteriaId": "8621ECA8-A467-471E-A871-72EDD10BB2FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:z490:-:*:*:*:*:*:*:*", "matchCriteriaId": "D16ACC77-CE53-4897-BEF8-50CFE7AD56FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "DFD9933D-824D-4351-9E9C-26EA987AAFA8", "versionEndExcluding": "14.5.32", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B485AC9-B986-4100-90CC-E4BC9B1AAFD1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F76BE235-C991-43BB-B145-239D95084BC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6748F85C-A99A-4380-B01A-A51DBD43AED9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*", "matchCriteriaId": "421F0AF2-5F41-4F0C-A909-D76D72AB5FCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C04332C1-9652-44ED-BD97-5A6AD0A4E6B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D376C32-99BE-4DF4-A63D-2156D10EEA73", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE118AB2-A2C4-452C-B9AD-DDEF65B5EC67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA0D6C21-7DCE-4F8C-9394-D0006695550D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD6B51B5-96AA-44C8-9539-9D7F67143DC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB78854-1E03-48F3-BC86-B0934641B47E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D3350F-8083-4FD3-9432-36C10EE911EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB28789-A195-4EB8-AE96-6E1EFEE93E6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C96A17A-44EE-4FD0-9187-9BB9202AA9C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D6425C6-A338-42A0-B236-12B33147931D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF3F6453-51EF-4509-94CB-24E8ECFBAC5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4861FF06-6720-4E5A-B599-F7F96D7D4FE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF098E89-4979-45DB-AF4C-A5D0F5CE6F67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "A263FA56-5F1F-4E91-A354-38648E130685", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*", "matchCriteriaId": "102AFB09-B4EC-456C-899A-A9ABDA120D54", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D24E8214-881A-4C15-A544-FB3FD5D14DCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*", "matchCriteriaId": "02454A49-0345-4927-89DF-7A37C25E4E11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1EDE72E-3734-4FB5-BC77-B7C3838D41F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E07450B-D81B-474D-9150-C9D8A62D44A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A892B60-7FD3-41A6-9997-586B76757416", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4701D592-F06C-4713-9736-19DB130B5E2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3E6063A-23C9-4845-B575-5D330B6C68F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D50C73A4-D52E-4560-B725-61F416E18505", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "25570E2C-BBE9-402F-9631-FA5014767CE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*", "matchCriteriaId": "D59D57C2-CFB5-486E-A340-E63C7D7A8B6D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "344A435C-1CC0-4EEA-84EA-48A223A529BC", "versionEndExcluding": "11.8.86", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:b150:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4A62BA8-3AE3-4339-97D3-4768A122C71C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:b250:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A2CDBC2-2B45-4E22-845A-EB8415D4C56D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7020u:-:*:*:*:*:*:*:*", "matchCriteriaId": "35F2CA68-9EEA-421F-A92E-E7685EC010EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7100:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC9F763B-B469-42DC-952F-48448121373F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7100e:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C17DCC3-9200-4198-B08D-EAD531B59995", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "31CBD3FB-0835-4F28-BFA2-3D07459066F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7C8B4BA-24E8-4856-A2D9-BD2CE2C858AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7100u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F059A42-0B43-4F79-BBAF-6ED05CFFE7EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7101e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B6B298A-1480-41C2-BE7C-7291E7256D7C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7101te:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB3ABEFE-11A5-4EC3-9537-F9C75A46FF65", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7102e:-:*:*:*:*:*:*:*", "matchCriteriaId": "14C20D2A-CD26-4019-A266-AB4E89EBD2E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7130u:-:*:*:*:*:*:*:*", "matchCriteriaId": "B608F333-BD78-4082-B2AE-0F5BBE7E0D9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7167u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F609E73-203F-45B9-9A3A-DC754B33860A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7300:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E3A734E-973B-4904-A905-51E438879B8F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CF355B2-A5D6-41CC-8404-2B61A594BA6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7320:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C51A38C-E4AE-46B9-ACE6-82E8F7B668D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-7350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E86321B-B1BD-43B7-A7F5-05CABE35F40E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD84789A-B7F4-493E-A3F6-D5287ACFEB98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A504EF6-8F7D-4839-B16D-FDCBD3B22287", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100h:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B28199-5B9A-4AC4-9529-77A6FC591DC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8100t:-:*:*:*:*:*:*:*", "matchCriteriaId": "33B0B0C9-54ED-4D7E-B0F2-C87690056800", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8109u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7DDCC11-A3DD-493E-AAFA-B50050FE3AC4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8121u:-:*:*:*:*:*:*:*", "matchCriteriaId": "70EAC725-DC8A-4DA9-8B01-0465EBE86D6E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8130u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6287BCB7-8EFD-485E-B40E-AE6B9DB067DF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8140u:-:*:*:*:*:*:*:*", "matchCriteriaId": "25227F52-7398-4E68-A973-B9177886BE0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8145u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D78093B-076C-48FB-A224-F94F5743ACF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8145ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "B230FB82-C498-4118-97D3-3835CB713E87", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8300:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1DCD6D7-7FF2-419B-A41C-CF1FA830F289", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8300t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8127E47-6082-4313-B310-1C6278471A21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-8350k:-:*:*:*:*:*:*:*", "matchCriteriaId": "C14BA084-59CC-40E8-A62F-7AD1C9DD9283", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7200u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E993BEE9-72BD-4615-B1BE-5E9129D61ABD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFA6BB38-CDF8-46B0-9910-897AB7920D18", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7267u:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF244D02-2B47-4884-8D70-37DFEB18CB60", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7287u:-:*:*:*:*:*:*:*", "matchCriteriaId": "615D9B0D-8E91-4C8F-B5BC-6315C2CA90BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7300hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE85AE7-B4BD-442E-AFAB-CD01744C91B7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7300u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2425FF8A-158C-40EE-BDBF-43E7641BC058", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7360u:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADA681B4-37F8-4E2E-B73B-E0E17C66B754", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7400:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE4C6ADA-EE5E-401D-82B4-6E450EDBD49E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "173C6F98-4022-4F40-A39A-D3D490CA6461", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7440eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6EACCCA-7ADB-40B8-87DD-A55313E5BB97", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7440hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F1BD53-55ED-4346-A67A-141B5BC552CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7442eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "44D7B5DF-716F-48E6-9445-BB56A620DEF1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7500:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F3E6176-6F6D-4488-A03B-2BBF846ADC93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AEAE7D3-6E26-43C5-B530-B0EE3DA65C80", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7600:-:*:*:*:*:*:*:*", "matchCriteriaId": "2603B0FB-A7B0-4E87-B989-D7EFFC2A64E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF705120-459D-49BA-BDCD-6AC38D95C820", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B91585C-4BD7-475B-8AC8-1B813A698D77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7y54:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFA675E6-83DD-47FF-BEBC-D32E5223A065", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-7y57:-:*:*:*:*:*:*:*", "matchCriteriaId": "F479F7E3-D0FA-4F66-8F5B-FFC845FFE5A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8200y:-:*:*:*:*:*:*:*", "matchCriteriaId": "2AC12E92-33CB-4603-AC14-3351CE1D4E3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8210y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E62309E-1071-4569-8C9A-11748D629CAB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8250u:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DDA599F-09D5-4351-B7F5-351A2E04E091", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8257u:-:*:*:*:*:*:*:*", "matchCriteriaId": "A205DBD9-A841-446A-8ED8-57989B806518", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8259u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0D473E4-5EB1-434D-9D8F-C9365988EEAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8260u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFEF82DB-59F7-4530-B3CC-3D417CD519B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8265u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D3E166F-3D9F-4D0D-924A-147883598EA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8269u:-:*:*:*:*:*:*:*", "matchCriteriaId": "70D9D4EE-A6CA-4C9F-905F-27570858B5FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8279u:-:*:*:*:*:*:*:*", "matchCriteriaId": "73DA1253-1652-417A-BE27-586EF8ED59F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "8BD64BB5-CBC1-4862-BEE6-04FC53017976", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8305g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4D55B9D-4BAB-4082-A33F-626E15229333", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8310y:-:*:*:*:*:*:*:*", "matchCriteriaId": "71294A32-F3DD-45EA-A0FC-C3EA0351FA29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8350u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E920376-561D-4892-97A2-F4400223B3CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8365u:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9054F35-AAB5-481E-B512-EDF4C3F2EA2F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8365ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "790A7B55-AD96-4B1C-A31A-C6778BFD5CC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D350A92-3992-4464-84AB-960ABCA45698", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400b:-:*:*:*:*:*:*:*", "matchCriteriaId": "43DA2F8C-1C05-4447-A861-A33E81050F37", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D9E3717-83D4-4C7B-9700-2ABDA6DDAD23", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA341190-21EC-46FB-849D-F54AD3DFCF93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8500:-:*:*:*:*:*:*:*", "matchCriteriaId": "908629C1-FD27-4247-A33E-4F5E57DFF918", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8500b:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A98CDB0-BC13-4FB3-9DF2-56D9DCD9002F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2AF0758-7F39-40C0-A174-4805AADACE14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99484C0-1349-47EC-AFEB-5F7F281A514E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF02D685-1E67-40E1-A858-000498D5D877", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-8600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9F74885-92EE-4F36-B4E1-5F1F8AD65F88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D566CFB-935B-40E4-9F4E-6216A42E7EBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A97ED15-D0C6-4B64-BA08-EE50A6990272", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D57834B-C031-4301-9839-7A32F13687EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEE126ED-B743-4C6D-95FF-04F473A9A008", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D901944-8E2B-41E5-BB82-CF1C97064711", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A13E353-0063-468B-96CD-97BF91C747C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "913BBEFF-49E7-42AF-A850-B49E5A12AB98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8C1205B-6AC7-4DB5-B247-2108511D9957", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA47107D-237A-4184-8BA2-601660F7FB5C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9862E49-124E-4B7D-941A-CFD2668B6481", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE6572E2-5B24-4E21-9F6F-3A7A17A9F098", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*", "matchCriteriaId": "85C7AD56-CA31-4C08-A5C1-B50E767E1FFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-8950hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "469D79CD-B627-4ACF-ABC7-0EAE5D41A005", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_m3-7y30:-:*:*:*:*:*:*:*", "matchCriteriaId": "18340F86-5545-4EEF-9F79-6560BB24F277", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_m3-7y32:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC6872D8-0625-4404-866D-6592319E513C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_m3-8100y:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5AFFC8B-3AC1-49B4-9A73-18A3EC928591", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h110:-:*:*:*:*:*:*:*", "matchCriteriaId": "09271283-1681-4EB4-8BD3-DE01674D4D19", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h170:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B23A6C6-89CF-42CA-A3D0-E17EB8104BBE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:h270:-:*:*:*:*:*:*:*", "matchCriteriaId": "2715B64C-204D-4243-944E-434FDA366AA9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q150:-:*:*:*:*:*:*:*", "matchCriteriaId": "73A05885-8AFD-4FFA-BE18-9CE24A1427B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q170:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7BB0694-7F15-4784-97AA-9E9783B3702C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q250:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6E4C9D1-C1E8-43E1-88B8-76637A991EB1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:q270:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E68EB4-7634-42AB-8DCD-8C87C86F78E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*", "matchCriteriaId": "E20F674C-6522-42E4-85D9-B4C39A882D20", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:z170:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6E0469E-FFC6-46BF-BB03-34326D1DBE19", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*", "matchCriteriaId": "955612CC-223F-47C0-9D75-D71A39E61A3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "3534330A-7977-455C-B154-C21DB841D80A", "versionEndExcluding": "11.12.86", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:c420:-:*:*:*:*:*:*:*", "matchCriteriaId": "69ECA4C4-3A03-4C07-9461-63C84221CD80", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:x299:-:*:*:*:*:*:*:*", "matchCriteriaId": "E20F674C-6522-42E4-85D9-B4C39A882D20", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "DBA1D370-9B27-4535-8003-8F6A4A8D4A46", "versionEndExcluding": "11.22.86", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B9B4AE9-72ED-43CB-9705-ED6BDD80AEC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c621a:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2364774-DA5C-48BF-AEDB-E97BFED643F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*", "matchCriteriaId": "C51E9A02-E6FC-42AD-8269-07EFEFD2ADD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*", "matchCriteriaId": "92911979-A714-4643-AF03-64EDBD42DFF5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*", "matchCriteriaId": "79973EAB-9106-4417-88AF-8AC368E58050", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBB31B9D-05BC-4D0E-8CC8-52757131A6CF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*", "matchCriteriaId": "C518A082-388F-4DDE-8FDF-FEA95FD69B49", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BBE62C7-76BD-4684-8CDE-68DBFF4E5280", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA2DAF1D-8994-491E-BD65-642C23778DB7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF0DA068-0D77-4358-BDEE-572811836689", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8B0316B-1968-4502-955D-78E9BDC2E30C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:z270:-:*:*:*:*:*:*:*", "matchCriteriaId": "955612CC-223F-47C0-9D75-D71A39E61A3D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_and_manageability_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "ED3DFF13-16FD-40C3-9762-0D1AE79DB527", "versionEndExcluding": "15.0.22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:*", "matchCriteriaId": "D63F16DE-E30E-4268-B079-E07FD28355BD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:*", "matchCriteriaId": "936DAD12-11D6-4AAF-B48D-5076C94BF30C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-11100b:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFD8DB12-8CBE-4140-97A2-B88C3BF61E6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C60AF0D-983D-454E-8940-209C471DC041", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F26C6DA-ED6B-444A-A63A-5155FCA4F0DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:*", "matchCriteriaId": "66BAF09D-8199-4579-B25A-E7C5177385E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "21EA30AA-713F-40AD-8C94-C1129198EE98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0D9B687-C3EE-4AF5-B9BE-7F0698D0F258", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "114DF43C-839F-4066-AA30-8DC16B1D6687", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BCD9C35-95D0-49E6-A9AC-E3AA8CD3F7B0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B40E9EC2-A8A6-4800-9F9E-B1237832D6F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "158CC66D-32E5-4396-8E5D-4D90EE9AB62C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:*", "matchCriteriaId": "55227C1C-D6CE-40AD-A5AA-7143E0A7AEF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "E84F0381-296A-408E-90D4-A316EE894A9D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:*", "matchCriteriaId": "092E3E45-5F58-412F-BAC9-C3B5290D8349", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EA7E6D0-0ADA-4BE1-8273-69AB3DE3BA36", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6FCAFC0-EEE2-43E4-AE90-1803588B5689", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8640175-3BC2-4C7B-A5A3-51E5677EDECA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "7077CBF1-1FC8-4AF9-8B39-A15871FFD3CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "53D902B5-D135-4961-AED9-EA6DF06534B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:*", "matchCriteriaId": "2910EB49-C9C6-4FC9-AA55-E7A0DAE28B93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "B858B433-9DA0-4224-B94C-4962FB3A4138", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F6B5FC3-8E55-430A-A55A-AF541690C576", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11500b:-:*:*:*:*:*:*:*", "matchCriteriaId": "06660D0F-FBB9-4C44-9972-DCE0E6249D7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:*", "matchCriteriaId": "55568460-F318-48FB-90E4-55CBBAF13E59", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7AFF680-DBC6-432E-A6DE-E7E7E4F2F26A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADB84973-3DAC-4458-A817-943302F5EFF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B26C730-32FA-4D51-88FA-E724147147BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFF7C5BF-E151-42DB-B0CF-E2589904C9A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "E12D6BD2-7D32-4194-84D3-A0DE4B88BFF0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3EC487F-B9A8-410F-AE1F-8D1B74BA77D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*", "matchCriteriaId": "63719B1D-5A98-44E3-80D8-CF0B4C1C6F80", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5365D3B-1B0B-416D-ACFB-23843FD25EAF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:*", "matchCriteriaId": "2556EF0A-B29F-4E9E-BB77-955CBC851EFA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "5601E40A-96E1-4321-9682-055A1C607488", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF36D9CC-2FD8-4D08-8712-E625D4754613", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A59A0C-91F2-4AE7-AF60-D98059542438", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*", "matchCriteriaId": "3252CF19-9D1D-4A46-9C94-0E7255CDDD8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "E11C7F38-3313-4F6D-9D5D-E61C89E716B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "70B0C976-3B68-4647-909A-5D574D711C7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA18192E-7DBB-45BB-8568-CA7159AF8CE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2FDB568-5340-4DD8-B933-1CD64C370BD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28DF93B-E15D-47D3-B9C0-4AEE8B7FADD0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F2DD1D-DB6F-44D1-BE3B-C798C09CC5F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "12ADA9A2-6E64-4F17-B369-816639F0D3BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*", "matchCriteriaId": "514B7B5E-D60D-464A-8CB0-273044FD2E09", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFB608EE-83AF-4192-93E1-7DDBA5F6A54C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "B807B5D8-BCDB-4398-8ADC-DBD1BD8D2B88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:*", "matchCriteriaId": "5CC25725-73F6-4948-B17A-A05E8978EB78", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D9BFA32-89B3-4E26-B980-2694B5378D8B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:*", "matchCriteriaId": "65E2A7C5-78D9-4F75-B8A2-5EB3ECEFBFF3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2D04A37-79EE-467B-BD8A-0CA0BDD85F0A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900kb:-:*:*:*:*:*:*:*", "matchCriteriaId": "84C7E63D-3622-4F10-94E1-E03357C5C167", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FECF6BE-2CED-4510-91C5-195686C9C421", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:*", "matchCriteriaId": "B903E2A0-EE73-4F13-AB26-8F5644462E94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:*", "matchCriteriaId": "170B497C-05F2-46B5-92CD-ACF7C0BE1711", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEF53EA8-8EB4-455C-A986-405DBB122D3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B485AC9-B986-4100-90CC-E4BC9B1AAFD1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F76BE235-C991-43BB-B145-239D95084BC8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:*", "matchCriteriaId": "6748F85C-A99A-4380-B01A-A51DBD43AED9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:*", "matchCriteriaId": "421F0AF2-5F41-4F0C-A909-D76D72AB5FCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:*", "matchCriteriaId": "C04332C1-9652-44ED-BD97-5A6AD0A4E6B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D376C32-99BE-4DF4-A63D-2156D10EEA73", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE118AB2-A2C4-452C-B9AD-DDEF65B5EC67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA0D6C21-7DCE-4F8C-9394-D0006695550D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD6B51B5-96AA-44C8-9539-9D7F67143DC3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:*", "matchCriteriaId": "5529CD96-F41E-4DD5-A9BE-6BDF84F9A9F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EB78854-1E03-48F3-BC86-B0934641B47E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:*", "matchCriteriaId": "64D3350F-8083-4FD3-9432-36C10EE911EB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:*", "matchCriteriaId": "CFB28789-A195-4EB8-AE96-6E1EFEE93E6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C96A17A-44EE-4FD0-9187-9BB9202AA9C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D6425C6-A338-42A0-B236-12B33147931D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF3F6453-51EF-4509-94CB-24E8ECFBAC5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4861FF06-6720-4E5A-B599-F7F96D7D4FE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF098E89-4979-45DB-AF4C-A5D0F5CE6F67", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:*", "matchCriteriaId": "A263FA56-5F1F-4E91-A354-38648E130685", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:*", "matchCriteriaId": "102AFB09-B4EC-456C-899A-A9ABDA120D54", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D24E8214-881A-4C15-A544-FB3FD5D14DCA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:*", "matchCriteriaId": "02454A49-0345-4927-89DF-7A37C25E4E11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:*", "matchCriteriaId": "F1EDE72E-3734-4FB5-BC77-B7C3838D41F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E07450B-D81B-474D-9150-C9D8A62D44A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A892B60-7FD3-41A6-9997-586B76757416", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:*", "matchCriteriaId": "4701D592-F06C-4713-9736-19DB130B5E2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3E6063A-23C9-4845-B575-5D330B6C68F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D50C73A4-D52E-4560-B725-61F416E18505", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:*", "matchCriteriaId": "25570E2C-BBE9-402F-9631-FA5014767CE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:*", "matchCriteriaId": "D59D57C2-CFB5-486E-A340-E63C7D7A8B6D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "480C5657-5C05-40F5-B76A-E67119727ED8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "324ADC7E-AECD-4B7D-8571-5399542C2BF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6422BF3-01B7-443B-BD2B-80E45D7C3F5F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "696F47E6-C1CA-4A58-A91F-4B3EA92954AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76E9B752-2DA7-4182-A52E-C13F93FB2B22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D1BCD50-6174-49A7-BEE4-BD7DD72C09AE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*", "matchCriteriaId": "55156889-E9DA-4F04-B894-339DC39CA942", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEB756BB-E343-451A-866D-40B41E059705", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18A51183-A6EF-4AC8-9A85-29FF7768AE3A", "versionEndExcluding": "25.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2A29C2D-A16F-443F-AA01-535B43F8BBBA", "versionEndExcluding": "25.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0368B9A-D5FB-4EDA-88BA-E44901F2A0BA", "versionEndExcluding": "25.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41A30BE8-ABAD-48E0-A4B1-1EBD53A31647", "versionEndExcluding": "25.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87F0538B-ED6E-40C7-9C2A-4C5DC3D2935E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper buffer restrictions in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32 and 15.0.22 may allow a privileged user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Unas restricciones de b\u00fafer inapropiadas en un subsistema en Intel\u00ae CSME versiones anteriores a 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32 y 15.0.22 pueden permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local" } ], "id": "CVE-2020-8703", "lastModified": "2024-11-21T05:39:17.607", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-09T19:15:09.233", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0004/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210611-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-03 02:15
Modified
2024-11-21 06:26
Severity ?
Summary
An issue was discovered in AhciBusDxe in the kernel 5.0 through 5.5 in Insyde InsydeH2O. Because of an Untrusted Pointer Dereference that causes SMM memory corruption, an attacker may be able to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20220222-0003/ | Third Party Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge | Vendor Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge/SA-2022024 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20220222-0003/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge/SA-2022024 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "A64DE17F-735B-490B-A4AD-8606684DDB5D", "versionEndExcluding": "5.08.41", "versionStartIncluding": "5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9D6D0-77EF-41CE-ACB2-A43B0543F9C7", "versionEndExcluding": "5.16.41", "versionStartIncluding": "5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADDAD8E2-7468-4D96-8A9F-8C2BB0E8EACB", "versionEndExcluding": "5.26.41", "versionStartIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AF0CD01-CD57-41D5-9827-437F0683E13B", "versionEndExcluding": "5.35.41", "versionStartIncluding": "5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "2DA61A73-A290-493E-A797-1A7E7AF0BDE5", "versionEndExcluding": "5.43.41", "versionStartIncluding": "5.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "0CB4ED22-F39A-45BD-B748-5C67D0BEEF53", "versionEndExcluding": "5.51.41", "versionStartIncluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "324ADC7E-AECD-4B7D-8571-5399542C2BF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "480C5657-5C05-40F5-B76A-E67119727ED8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AEB5AD1-3973-4150-BEA2-C9DE0B98222F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F63C0B17-60E2-4240-92FD-4B7C7D8F2C8B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc227g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3F52F29-0ACF-4ECC-927A-0CB27399E5D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D1E85AC-1305-4C5E-AD8B-39B2654F6057", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc277g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F203C449-2B5C-47A1-BF3D-8DCFD29F0B18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*", "matchCriteriaId": "320F5752-86B3-4C08-89D0-02272753A6D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc327g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A37FB5EC-BB64-472C-81FC-8EEF238E3C12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC7303D1-CC95-42C7-B843-C3B3B3336669", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc377g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45013BCA-3897-4D58-81FA-D8CB9D19268C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDD6F034-BC50-4223-AE5D-319F04C866A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6422BF3-01B7-443B-BD2B-80E45D7C3F5F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "696F47E6-C1CA-4A58-A91F-4B3EA92954AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F712060C-ECDB-4BC7-B9B9-468B41DE615B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D511C170-65E5-416D-B7CE-557A503F25AE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "577C19F5-82ED-46DF-91CC-A074DE99EBDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEF4592C-5DB3-45F4-B354-59701BBA0C08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87F0538B-ED6E-40C7-9C2A-4C5DC3D2935E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in AhciBusDxe in the kernel 5.0 through 5.5 in Insyde InsydeH2O. Because of an Untrusted Pointer Dereference that causes SMM memory corruption, an attacker may be able to write fixed or predictable data to SMRAM. Exploiting this issue could lead to escalating privileges to SMM." }, { "lang": "es", "value": "Se descubri\u00f3 un problema en AhciBusDxe en el kernel versi\u00f3n 5.0 hasta la versi\u00f3n 5.5 en InsydeH2O. Debido a una desviaci\u00f3n de puntero no fiable que provoca la corrupci\u00f3n de la memoria de SMM, un atacante puede ser capaz de escribir datos fijos o predecibles en SMRAM. La explotaci\u00f3n de este problema podr\u00eda llevar a escalar privilegios a SMM" } ], "id": "CVE-2021-41837", "lastModified": "2024-11-21T06:26:51.320", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-03T02:15:07.033", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0003/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2022024" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2022024" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-09-12 19:29
Modified
2024-11-21 04:05
Severity ?
Summary
Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C23AFAB4-B286-4FD6-ABC3-86B2881E271C", "versionEndExcluding": "12.0.5", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5FAD938-027A-406F-9E7C-1BFD992839F4", "versionEndExcluding": "12.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63591E72-6038-4417-BA10-54180507AF0F", "versionEndExcluding": "11.0", "versionStartIncluding": "9.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "503E551C-FC5F-4ABC-8DEA-E360701F0B33", "versionEndExcluding": "22.01.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33F546AF-8F80-4E0A-9B92-86E3A1F931C0", "versionEndExcluding": "21.01.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B5B6E6B-16A0-4236-AABE-82385B53EC78", "versionEndExcluding": "21.01.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D476D093-4A97-499C-B40D-7A301BC9AA2E", "versionEndExcluding": "r1.30.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pc547e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6A757F1-E478-4A3D-8D5F-C996E176A11A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30F129DB-51AC-4F40-A0D1-AB5CF90D9C2D", "versionEndExcluding": "r1.23.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "790D244A-AC3D-4BBC-9139-A90048FD375A", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C046182-BB33-41D0-B041-1566B8041917", "versionEndExcluding": "19.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DE74300-E061-452E-AD1D-6DD7C2C62729", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE4A7C13-6F81-4629-9C28-9202028634AE", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D87239-40C1-4038-B734-D77AC4DDD571", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93485235-481B-4BAF-BB7A-81BB5AA1BC53", "versionEndExcluding": "19.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F37D88-E086-4060-8420-BD0F8D8FF580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD949046-46E5-48C9-883B-92F04926E8BC", "versionEndExcluding": "23.01.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Bleichenbacher-style side channel vulnerability in TLS implementation in Intel Active Management Technology before 12.0.5 may allow an unauthenticated user to potentially obtain the TLS session key via the network." }, { "lang": "es", "value": "Vulnerabilidad de canal lateral estilo Bleichenbacher en la implementaci\u00f3n TLS en Intel Active Management Technology en versiones anteriores a la 12.0.5 podr\u00eda permitir que un usuario sin autenticar obtenga la clave de sesi\u00f3n TLS por red." } ], "id": "CVE-2018-3616", "lastModified": "2024-11-21T04:05:46.667", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-12T19:29:02.403", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106996" }, { "source": "secure@intel.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-05-22 12:29
Modified
2024-11-21 04:05
Severity ?
Summary
Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:atom_c:c2308:*:*:*:*:*:*:*", "matchCriteriaId": "CD028C10-FD07-4206-A732-CCAC1B6D043D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3308:*:*:*:*:*:*:*", "matchCriteriaId": "A93010C0-33B3-438F-94F6-8DA7A9D7B451", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3338:*:*:*:*:*:*:*", "matchCriteriaId": "2A988A78-6B3D-4599-A85C-42B4A294D86D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3508:*:*:*:*:*:*:*", "matchCriteriaId": "1D7C5EF4-3A92-4AF7-9B11-62B4FFDC5128", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3538:*:*:*:*:*:*:*", "matchCriteriaId": "246AA1B0-B6C8-406B-817D-26113DC63858", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3558:*:*:*:*:*:*:*", "matchCriteriaId": "00EE5B42-FF05-447C-BACC-0E650E773E49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3708:*:*:*:*:*:*:*", "matchCriteriaId": "B0779CC9-BD39-4E0B-B523-A6C69F9EBB0C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3750:*:*:*:*:*:*:*", "matchCriteriaId": "A1F0E3C4-7E9B-435F-907E-4BF4F12AF314", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3758:*:*:*:*:*:*:*", "matchCriteriaId": "5D616C72-0863-478C-9E87-3963C83B87E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3808:*:*:*:*:*:*:*", "matchCriteriaId": "CC333B0D-3A0E-4629-8016-68C060343874", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3830:*:*:*:*:*:*:*", "matchCriteriaId": "6655535C-FF64-4F9E-8168-253AABCC4F5D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3850:*:*:*:*:*:*:*", "matchCriteriaId": "B1EDEA1E-9A19-4B3F-806E-D770D1AB4C73", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3858:*:*:*:*:*:*:*", "matchCriteriaId": "BBD68F3F-7E38-40B9-A20B-B9BB45E8D042", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3950:*:*:*:*:*:*:*", "matchCriteriaId": "1EACEF19-83BC-4579-9274-BE367F914432", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3955:*:*:*:*:*:*:*", "matchCriteriaId": "1CC73291-AA6F-40B0-860A-1F2E6AB1E2AC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_c:c3958:*:*:*:*:*:*:*", "matchCriteriaId": "24128A7F-2B0B-4923-BA9E-9F5093D29423", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3805:*:*:*:*:*:*:*", "matchCriteriaId": "0990DD71-9E83-499D-9DAF-A466CF896CFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3815:*:*:*:*:*:*:*", "matchCriteriaId": "9B7FEDEF-9772-4FB1-9261-020487A795AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3825:*:*:*:*:*:*:*", "matchCriteriaId": "FE7B0F72-DEDF-40C4-887C-83725C52C92E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3826:*:*:*:*:*:*:*", "matchCriteriaId": "9568C222-9816-4520-B01C-C1DC2A79002D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3827:*:*:*:*:*:*:*", "matchCriteriaId": "4B2F8FAD-1688-4369-BB4B-9FA9F30A80A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_e:e3845:*:*:*:*:*:*:*", "matchCriteriaId": "53A1F23D-7226-4479-B51F-36376CC80B04", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*", "matchCriteriaId": "454AC633-5F1C-47BB-8FA7-91A5C29A1DD5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2394E8C-58D9-480B-87A7-A41CD7697FC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B9AC02B-D3AE-4FAF-836E-55515186A462", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2420:*:*:*:*:*:*:*", "matchCriteriaId": "65AAC7A7-77CA-4C6C-BD96-92A253512F09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2460:*:*:*:*:*:*:*", "matchCriteriaId": "FCD16C07-0050-495A-8722-7AC46F5920F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2480:*:*:*:*:*:*:*", "matchCriteriaId": "01423706-C82C-4457-9638-1A2380DE3826", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2520:*:*:*:*:*:*:*", "matchCriteriaId": "A881E2D3-A668-465F-862B-F8C145BD5E8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2560:*:*:*:*:*:*:*", "matchCriteriaId": "3E5B9B98-0EF0-4ACD-B378-F9DE5AB36CBB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2580:*:*:*:*:*:*:*", "matchCriteriaId": "4BDC6806-E4FC-4A6E-A6BB-88C18E47ABFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z2760:*:*:*:*:*:*:*", "matchCriteriaId": "6602DD69-E59A-417D-B19F-CA16B01E652C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3460:*:*:*:*:*:*:*", "matchCriteriaId": "05C493EE-EF9F-47E2-8F88-86DF6C5F1FF9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3480:*:*:*:*:*:*:*", "matchCriteriaId": "40010DAE-DD1A-4A81-B6E9-EDC1B0DDCAB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3530:*:*:*:*:*:*:*", "matchCriteriaId": "ED96AC16-12CC-43F6-ACC8-009A06CDD8F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3560:*:*:*:*:*:*:*", "matchCriteriaId": "2CE9DC29-C192-4553-AF29-D39290976F47", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3570:*:*:*:*:*:*:*", "matchCriteriaId": "F625E647-B47E-404C-9C5B-72F3EB1C46F5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3580:*:*:*:*:*:*:*", "matchCriteriaId": "E3AF3279-89E7-4C91-8C5F-5AD5937CD0C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3590:*:*:*:*:*:*:*", "matchCriteriaId": "B5878612-9825-4737-85A5-8227BA97CBA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735d:*:*:*:*:*:*:*", "matchCriteriaId": "F453D348-28CE-402B-9D40-A29436A24ECC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735e:*:*:*:*:*:*:*", "matchCriteriaId": "36322F4B-83D7-468A-BB34-1C03729E9BF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735f:*:*:*:*:*:*:*", "matchCriteriaId": "0AD22811-C3C6-4B5E-98D5-D3F2240E6C8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3735g:*:*:*:*:*:*:*", "matchCriteriaId": "A3C7D0BA-8F07-42AD-8BB9-C65472BE41C1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3736f:*:*:*:*:*:*:*", "matchCriteriaId": "B0A2A50E-94FA-44E9-A45D-3016750CFBDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3736g:*:*:*:*:*:*:*", "matchCriteriaId": "5625CAD8-4A62-4747-B6D9-90E56F09B731", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3740:*:*:*:*:*:*:*", "matchCriteriaId": "43A234CE-D6AA-4A32-8425-1A4DDA0F6B6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3740d:*:*:*:*:*:*:*", "matchCriteriaId": "78DE1A01-3AEF-41E6-97EE-CB93429C4A1D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3745:*:*:*:*:*:*:*", "matchCriteriaId": "410184AF-B932-4AC9-984F-73FD58BB4CF7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3745d:*:*:*:*:*:*:*", "matchCriteriaId": "B265F073-9E0A-4CA0-8296-AB52DEB1C323", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3770:*:*:*:*:*:*:*", "matchCriteriaId": "3F664223-1CBC-4D8A-921B-F03AACA6672B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3770d:*:*:*:*:*:*:*", "matchCriteriaId": "987A8470-08BA-45DE-8EC0-CD2B4451EECD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3775:*:*:*:*:*:*:*", "matchCriteriaId": "8BBC9542-FB77-4769-BF67-D42829703920", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3775d:*:*:*:*:*:*:*", "matchCriteriaId": "74FDC18B-4662-422E-A86A-48FE821C056F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3785:*:*:*:*:*:*:*", "matchCriteriaId": "CAB4AA2C-D1D9-44D8-9471-66EBDE9DC66D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:atom_z:z3795:*:*:*:*:*:*:*", "matchCriteriaId": "CBA3E7AE-CB74-48A8-A2B8-9FCADB6E40D2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j3455:*:*:*:*:*:*:*", "matchCriteriaId": "723E7155-493D-4B5A-99E2-AB261838190E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j4005:*:*:*:*:*:*:*", "matchCriteriaId": "82E37264-E4BA-4D9D-92E7-56DE6B5F918F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_j:j4105:*:*:*:*:*:*:*", "matchCriteriaId": "8704BE6D-2857-4328-9298-E0273376F2CD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:celeron_n:n3450:*:*:*:*:*:*:*", "matchCriteriaId": "C1289B9E-5725-42EF-8848-F545421A29E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:32nm:*:*:*:*:*:*:*", "matchCriteriaId": "50287A9B-366F-41F2-BEBD-D4C64EF93035", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i3:45nm:*:*:*:*:*:*:*", "matchCriteriaId": "CCB79F2F-5522-45D3-A1D1-DC2F5A016D99", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:32nm:*:*:*:*:*:*:*", "matchCriteriaId": "9749C2B0-B919-4172-A2AD-04C99A479F5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i5:45nm:*:*:*:*:*:*:*", "matchCriteriaId": "0F1F45A1-A17D-4895-8A71-00010C7E55D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:32nm:*:*:*:*:*:*:*", "matchCriteriaId": "D46BF41F-C44C-4D87-862E-0D156A2298DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_i7:45nm:*:*:*:*:*:*:*", "matchCriteriaId": "5927D78A-EE05-4246-A141-4A8815AB228B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:32nm:*:*:*:*:*:*:*", "matchCriteriaId": "579FC479-DEA0-415D-8E8F-18A81A85A471", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:core_m:45nm:*:*:*:*:*:*:*", "matchCriteriaId": "CEECAA34-57F4-4B01-857C-C8454E1EDCAB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium:n4000:*:*:*:*:*:*:*", "matchCriteriaId": "967252A4-EC1F-4B31-97B8-8D25A3D82070", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium:n4100:*:*:*:*:*:*:*", "matchCriteriaId": "3205757B-07DB-4115-B3E0-4DF9D0EA2061", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium:n4200:*:*:*:*:*:*:*", "matchCriteriaId": "2AF8ABFA-BBFD-42F5-9769-00F8CD67F7FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_j:j4205:*:*:*:*:*:*:*", "matchCriteriaId": "88AF1366-8A14-4741-8146-886C31D8D347", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_silver:j5005:*:*:*:*:*:*:*", "matchCriteriaId": "7AEAA43A-4D97-4E13-82E1-895F3B368B25", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:pentium_silver:n5000:*:*:*:*:*:*:*", "matchCriteriaId": "BB6BAE0B-103D-430E-BAE9-429881620DE8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e-1105c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2832E8BF-7AC7-444C-B297-66F770860571", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:125c_:*:*:*:*:*:*:*", "matchCriteriaId": "E9D0A534-1749-4ED3-8F18-BF826D84EB56", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1220_:*:*:*:*:*:*:*", "matchCriteriaId": "B581515E-29CC-462F-BB10-4EA6DE2D6637", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1275_:*:*:*:*:*:*:*", "matchCriteriaId": "036D395E-AFE8-4D61-91CC-E9B3CD8B6380", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1505m_v6:*:*:*:*:*:*:*", "matchCriteriaId": "44AA72FB-E78D-419E-AA82-B0538C6504D3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1515m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "687C3BF3-D71A-49AD-8A05-EAC07CBCD949", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "90AF90D9-16C4-4F8A-9868-3E2823E3445C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1535m_v6:*:*:*:*:*:*:*", "matchCriteriaId": "3C063C53-8970-45B1-85F8-FB2080BF4695", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1545m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "64596ED7-794A-4D23-987B-D9AD59D48EA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1558l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "C2E52BA6-2F2F-4CD2-A601-5B0ADDE5E23F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1565l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "3FDA48F0-0F35-4A8F-8117-B0B28E00AB95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1575m_v5:*:*:*:*:*:*:*", "matchCriteriaId": "A561A8E8-79E2-4071-B57D-590C22EF86A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1578l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "92E46658-60AB-4758-9236-3AC0E6464383", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1585_v5:*:*:*:*:*:*:*", "matchCriteriaId": "207B8FBA-E2FF-485A-9AD9-E604AE0FB903", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:1585l_v5:*:*:*:*:*:*:*", "matchCriteriaId": "33F99640-C753-40BE-A0A1-4C2D92E7DB09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:3600:*:*:*:*:*:*:*", "matchCriteriaId": "36609915-9E0D-4204-B544-4832E1195BA6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:5600:*:*:*:*:*:*:*", "matchCriteriaId": "3612AC78-4904-4830-85DF-38A38F617379", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:7500:*:*:*:*:*:*:*", "matchCriteriaId": "B79CC0FA-3DA1-4812-8E73-B0FF0752E31E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:e5502:*:*:*:*:*:*:*", "matchCriteriaId": "D12F3759-48D2-4208-AD5B-3AC8B012D061", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:e5503:*:*:*:*:*:*:*", "matchCriteriaId": "E7C61D9B-2733-4A67-9D6A-2290123C0405", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:e5504:*:*:*:*:*:*:*", "matchCriteriaId": "44C3C383-6927-44AD-9488-8B916D5959ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:e5506:*:*:*:*:*:*:*", "matchCriteriaId": "7FC1E41C-7A17-42B7-936D-09A236D9C4D9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:e5507:*:*:*:*:*:*:*", "matchCriteriaId": "E814CB3E-4542-4E3E-91E8-D97EA17C0B1F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:e5520:*:*:*:*:*:*:*", "matchCriteriaId": "8FD43D7C-932B-463F-8EB2-3A115FBED4BE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:e5530:*:*:*:*:*:*:*", "matchCriteriaId": "9CCD70F8-D81D-467B-8042-5D3B9AC513E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:e5540:*:*:*:*:*:*:*", "matchCriteriaId": "D05C68D0-4771-4338-9761-6428195F0318", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:e6510:*:*:*:*:*:*:*", "matchCriteriaId": "C4FC2878-389F-4687-8377-E192A1C519BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:e6540:*:*:*:*:*:*:*", "matchCriteriaId": "4B24CEBE-51B1-4EC5-8770-BFDB0625193A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:e6550:*:*:*:*:*:*:*", "matchCriteriaId": "61BD85A8-39D9-4248-96FE-CAEF4BC7CD44", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:l3403:*:*:*:*:*:*:*", "matchCriteriaId": "8320D28B-B10D-47AE-9B65-51304F93F9AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:l3406:*:*:*:*:*:*:*", "matchCriteriaId": "35AD843A-EBB1-42BE-A305-595C23881404", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:l3426:*:*:*:*:*:*:*", "matchCriteriaId": "0D457B8B-50A6-411C-8528-96915B697C1A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:l5506:*:*:*:*:*:*:*", "matchCriteriaId": "3934C421-BD11-4174-83F4-3E20176F03F9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:l5508_:*:*:*:*:*:*:*", "matchCriteriaId": "45EE1BA7-5356-4421-9CF2-48DA09EBAE3E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:l5518_:*:*:*:*:*:*:*", "matchCriteriaId": "92FE452A-EE8B-4ACE-96B1-B6BD81FAC9B3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:l5520:*:*:*:*:*:*:*", "matchCriteriaId": "47195FE7-3692-42C4-B29E-679A6FE0E220", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:l5530:*:*:*:*:*:*:*", "matchCriteriaId": "C033BBFA-67F4-4F24-A042-FF996B327976", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:w5580:*:*:*:*:*:*:*", "matchCriteriaId": "BBF7A770-3E90-4466-8595-8E523D82BC62", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:w5590:*:*:*:*:*:*:*", "matchCriteriaId": "FA7922C0-AB84-4331-BE8F-71A0D95D4F43", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:x3430:*:*:*:*:*:*:*", "matchCriteriaId": "648CB034-89BF-48FF-A3BF-C84C08FE09E3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:x3440:*:*:*:*:*:*:*", "matchCriteriaId": "2A7DC164-65FF-483A-AD69-3E23E449E52C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:x3450:*:*:*:*:*:*:*", "matchCriteriaId": "8D3DCB95-5139-44C6-8151-8CEFD37F9DAB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:x3460:*:*:*:*:*:*:*", "matchCriteriaId": "ED5FEA46-49A2-4082-98D2-56E698A56909", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:x3470:*:*:*:*:*:*:*", "matchCriteriaId": "0B85D7F3-1FA5-4FE1-AAFF-CEE8DF822CC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:x3480:*:*:*:*:*:*:*", "matchCriteriaId": "80607FEB-8908-40F6-B702-FD56D849E2D0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:x5550:*:*:*:*:*:*:*", "matchCriteriaId": "97F20575-82C0-466D-8FDD-AAC034247D0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:x5560:*:*:*:*:*:*:*", "matchCriteriaId": "648E21A8-6B5F-4C97-A71A-44B97DBB4FE0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3:x5570:*:*:*:*:*:*:*", "matchCriteriaId": "172EA906-A08F-4D2A-9814-937C07F77C8D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1105c_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA1EC6D3-01CD-4CAB-817D-AE2E72FD0D03", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1125c_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDBA35BD-1048-4B6E-96B2-1CFF615EB49A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "979FEE9F-A957-43B6-BB6D-1A851D6FA11C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A7AF59D-D05E-47F9-B493-B5CD6781FDDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EF7EC93-0170-45A9-86C7-5460320B2AE9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8A7B1C2-D2CE-485A-9376-27E14F3FA05A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_12201:-:*:*:*:*:*:*:*", "matchCriteriaId": "B5F803AC-DCC7-43FC-BEB3-AA7984E0506C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_12201_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "560993AA-299D-42B7-B77F-1BD0D2114CCB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1220l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C582B1C-1DAC-48FD-82DD-7334C10A2175", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7862B0C-2C44-4110-A62A-083116129612", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "048C5996-F719-4338-B148-0DD1C13E02FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0196DA2F-CFA7-44D0-BDF5-37C7403E3B9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B9FF7FB-AB5A-4549-8C15-E69458C649E2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1225_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CEF6608-B650-4C77-9823-0AD57B3484F1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1226_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BE6A2D7-901C-45F9-B487-D674047D522E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCFCAC5E-6CF1-4EC1-A24C-688DD1016A96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ADCB509-5B0E-4592-8B23-EC25A3F79D41", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB51691F-089F-4016-B25E-238074B06C0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBAAC728-6A0F-4675-9677-AAF7DD5D38ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB3BFEFD-3D0D-48B0-A5AE-6F3C2D791CE1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1230l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC7E1AFD-9BCE-4487-A8DE-F9C60529CA7A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1231_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EA37503-FD3D-4220-933C-234631D6EDEF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1235:-:*:*:*:*:*:*:*", "matchCriteriaId": "72992831-2A76-456B-A80C-944BDD8591E4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1235l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "A79C2131-5566-4CC2-B6ED-38E3F6964500", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240:-:*:*:*:*:*:*:*", "matchCriteriaId": "60BFDAA6-3DFC-4908-BC33-B05BAB462F94", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6266056-770A-4E2D-A4FC-F1475257648E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "929AA8F3-8BDF-4614-9806-6D4231735616", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "605D7552-8184-4B11-96FD-FE501A6C97DD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "3144BBDE-CC96-4408-AA02-ECC3BF902A34", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1B8BA77A-34E3-4B9E-822A-7B7A90D35790", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1240l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E7165B43-ED22-4714-8FA4-1E201D1BFA69", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1241_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "67CFB133-FAF0-431A-9765-8A9738D6D87C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245:-:*:*:*:*:*:*:*", "matchCriteriaId": "2975B0F2-DB7C-4257-985A-482ED2725883", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "70221E07-3C2E-4A82-8259-AD583EB5CDDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "427DFD78-56CD-43C4-948E-F53AF9D669F3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E3E6F5F-6B82-43D9-BD6E-D22F9B991DB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1245_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "75AD7649-3FEA-4971-9886-6C9312B937A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1246_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4EE972C-6BAE-4342-BA01-1D685487F9C3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1258l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "27CDFE3B-C064-49A9-BD43-3F7612257A74", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1260l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BD0EEC1-D695-41A5-8CD6-9E987A547CC4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1260l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "C35AA9AC-28B3-49C2-A9B5-5D26DFEDB723", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4DBF25B8-D474-4C6B-8E45-F57DDC7074E7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DF18FD1-6670-4C3C-8000-A079C69D575E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1265l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D760EEAF-5CF5-4F25-8FA2-D4F75F4F5A91", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "921EB5A5-F911-4FCE-A6F1-C66818B34678", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1268l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "13878C13-1C7C-4B83-AF27-4998E8F659DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270:-:*:*:*:*:*:*:*", "matchCriteriaId": "023063E1-2DD7-487C-A8A7-939FAEE666A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "77255CE6-D7B7-4B48-993C-7100A1170BC6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B40AC368-3A14-4EFF-A8D0-7EFB4C83045D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3472AA7B-C0CF-4D65-8A6C-B1D52D27F0CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1270_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "C07E80D5-70A5-49C9-9044-D683C7ECCFF5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1271_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "63668AF4-F29C-4424-8EC5-2F0A5950DD58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C1C7CD-538D-4D7A-A81C-10DF5376A479", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5922F749-2B23-44B8-8A46-F31BCAEAD279", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C48BBAF-6B27-43D6-B86B-40CD8E7BA056", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D75D0EEB-707C-4C86-A569-E91E9F00BA77", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1275l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0FB0E20-0243-40A1-8DEF-37150791222E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1276_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "68CFF26D-8AD3-4179-9E4C-F06D7C858C9A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1278l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7541572C-229F-4963-B7F0-06EB3323E53B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280:-:*:*:*:*:*:*:*", "matchCriteriaId": "85DE669C-27FD-4196-8B8C-1DA4EE4C1D6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "479F7C77-D16F-4E40-9026-3EB8422E0401", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A242AC2-9AA6-43FD-90F4-5BF6E80DBB5E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "04DB08C8-0018-4A8E-A206-097BDDF83B08", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1280_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7193E85-30BE-42D5-A26B-3F88817F3574", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1281_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "446E8515-45FC-4B8B-8D12-60643D64C07F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBBDF6B2-D388-4639-87D8-064AA3F6B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "00AAB8B6-B614-4EAA-BA90-C5326CB5D07A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A371DF9-E224-404F-99C2-C2A4607E62D8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F40E356-365D-44B7-8C38-A0C89DDD6D3E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1285l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3132029-89F8-4359-A0DC-A275785266A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1286_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B02F5685-0636-48AB-B222-434CA1F3B336", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1286l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E51FDD60-88E5-4A86-BB8E-4C2D7EDEFA03", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1290:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ED4693C-DECF-4434-90C0-56158F102E7E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1290_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB408A6B-0842-43DA-9180-B0A299FCBCE6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1501l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "6215EBAC-7C75-4647-9970-482120897F1F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1501m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "3357FCAC-B6C4-4E3E-A40B-AB5084A7F9B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "3B1BD2B6-1AF6-4AD4-94FA-94B453A21908", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8D1FD6E8-80EC-461F-9ED1-CE5912399E80", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e3_1505m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E96F585E-BDEF-45EE-B0AB-94FE23753AC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2650l_v4:*:*:*:*:*:*:*", "matchCriteriaId": "3279C067-3058-4D46-A739-05404FD0E9B5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658:*:*:*:*:*:*:*", "matchCriteriaId": "DB4DF0A7-8BC2-48AE-9036-FED6EEC57DF3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v2:*:*:*:*:*:*:*", "matchCriteriaId": "C0855225-F501-486A-BD03-2A86FD252B5A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v3:*:*:*:*:*:*:*", "matchCriteriaId": "214C7B0C-C438-4000-9F9B-6D83294243AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4C91AA2E-4BB2-49C8-9364-4E363DF42CB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2658a_v3:*:*:*:*:*:*:*", "matchCriteriaId": "DA26781F-5A1C-4DA5-835E-D984D697F22B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660:*:*:*:*:*:*:*", "matchCriteriaId": "2EEA4222-F25D-4457-80AA-6D05CA918D68", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v2:*:*:*:*:*:*:*", "matchCriteriaId": "9F3E60D1-5CF9-4F96-9EDB-D87F8CF57272", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v3:*:*:*:*:*:*:*", "matchCriteriaId": "F4D321BC-6B1D-4C71-8E16-5A1319CEFD6C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2660_v4:*:*:*:*:*:*:*", "matchCriteriaId": "6777AC35-9D1F-4153-94AC-B25627D730E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2665:*:*:*:*:*:*:*", "matchCriteriaId": "A5F063F4-8994-4E46-BA7B-A12A112009BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667:*:*:*:*:*:*:*", "matchCriteriaId": "4D6F2DE5-AF11-439A-8D37-30CB882ECD58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v2:*:*:*:*:*:*:*", "matchCriteriaId": "E213DD86-5419-42C8-BF38-7795DDB3C582", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A972291E-5231-439D-873B-2F87BCAF800A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2667_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C089CC54-3229-43D7-AA15-73CFA1A43EE3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670:*:*:*:*:*:*:*", "matchCriteriaId": "EF268D83-C15D-4559-A46F-844E1D9264F0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CFE97C0D-3EA1-4314-A74A-7845C7778FB7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2670_v3:*:*:*:*:*:*:*", "matchCriteriaId": "34293F29-F327-4ADD-BF62-78F63F79BB96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680:*:*:*:*:*:*:*", "matchCriteriaId": "528C0A46-1CC4-4882-985A-0BB41525BC6B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v2:*:*:*:*:*:*:*", "matchCriteriaId": "643F3522-A452-4927-944D-532574EC4243", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v3:*:*:*:*:*:*:*", "matchCriteriaId": "58F40B78-4DBA-44EE-8420-086789EFF53D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2680_v4:*:*:*:*:*:*:*", "matchCriteriaId": "423BFD8F-4B50-43DA-9979-75FD18FBC953", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2683_v3:*:*:*:*:*:*:*", "matchCriteriaId": "8BAD4A68-0481-476F-BBBD-3D515331368C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2683_v4:*:*:*:*:*:*:*", "matchCriteriaId": "838CEB7C-7C4C-416C-86CE-6E8DD47EF25B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w:*:*:*:*:*:*:*", "matchCriteriaId": "CC7D021F-3C97-45B3-B1F7-0AC26959F22B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4A31AEF3-448D-417B-9589-4BA0A06F2FE8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v3:*:*:*:*:*:*:*", "matchCriteriaId": "F7A1D96F-7FFD-413F-ABCE-4530C3D63040", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2687w_v4:*:*:*:*:*:*:*", "matchCriteriaId": "FDB2B08B-D3C7-4B82-B170-471D6CDEFAE5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690:*:*:*:*:*:*:*", "matchCriteriaId": "4B8343FE-1320-40AE-A37F-70EF1A4AC4B7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CD42BA5A-7DA0-409D-8685-E43CF9B61D9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A5FF80E9-CF28-4EF6-9CFE-4B500A434674", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2690_v4:*:*:*:*:*:*:*", "matchCriteriaId": "7896A6C6-5918-4C27-85AF-6FEEFC7F8FD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v2:*:*:*:*:*:*:*", "matchCriteriaId": "647B77A4-2F49-4989-AF43-961D69037370", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v3:*:*:*:*:*:*:*", "matchCriteriaId": "805B1E33-F279-4303-9DF3-C81039A40C1C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2695_v4:*:*:*:*:*:*:*", "matchCriteriaId": "B971EA9E-AE5C-4A1D-AD55-8241F7B38C9C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v2:*:*:*:*:*:*:*", "matchCriteriaId": "DE7E0AAE-6539-4024-9055-BE0BAD702143", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v3:*:*:*:*:*:*:*", "matchCriteriaId": "7F1A8828-0765-4799-AD6C-143F45FAAD23", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697_v4:*:*:*:*:*:*:*", "matchCriteriaId": "12D34618-1CCA-405B-A49C-EB384A09C2C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2697a_v4:*:*:*:*:*:*:*", "matchCriteriaId": "575D6061-66BC-4862-BC84-ECD82D436E2A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2698_v3:*:*:*:*:*:*:*", "matchCriteriaId": "56B6EE64-1AD4-46B2-BA65-BB6282E56EB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2698_v4:*:*:*:*:*:*:*", "matchCriteriaId": "11650B45-0BDA-42BF-AEF3-83B48DD6A71D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699_v3:*:*:*:*:*:*:*", "matchCriteriaId": "BD3C92BA-827B-48AF-BBB3-FB60A9053C22", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699_v4:*:*:*:*:*:*:*", "matchCriteriaId": "AC097E24-F6C9-40D9-95E9-7EFDFA61AFF5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699a_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5EB44CA7-DFE6-4B1A-9A63-97AE30017E49", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:2699r_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4B305EFA-6226-412C-90EE-F0691F2DDDE0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4603:*:*:*:*:*:*:*", "matchCriteriaId": "7F3874FA-63CB-4B5D-8B64-CE920320A4E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4603_v2:*:*:*:*:*:*:*", "matchCriteriaId": "0800ED17-50E4-43F3-B46C-591DFA818BA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4607:*:*:*:*:*:*:*", "matchCriteriaId": "A46B0405-F301-4209-8766-6E12EAFAD157", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4607_v2:*:*:*:*:*:*:*", "matchCriteriaId": "F99F9F1F-A967-4884-96CF-4488102DC0A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610:*:*:*:*:*:*:*", "matchCriteriaId": "DA9B37AD-4599-425B-B39F-E571F4975266", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v2:*:*:*:*:*:*:*", "matchCriteriaId": "C5A5F1CF-A1E6-45F1-8B09-36566778DB57", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v3:*:*:*:*:*:*:*", "matchCriteriaId": "698C8A49-888B-4675-B3B0-25EDE2FD515E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4610_v4:*:*:*:*:*:*:*", "matchCriteriaId": "70D98F97-8EF4-48B5-84BE-C3CC27031FDA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4617:*:*:*:*:*:*:*", "matchCriteriaId": "B473D1FA-909B-492E-9C5B-94B0E20E1C0E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620:*:*:*:*:*:*:*", "matchCriteriaId": "BFD5EA7E-322E-4CE6-89D4-7DB1055C9034", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v2:*:*:*:*:*:*:*", "matchCriteriaId": "67836379-4E1A-45CD-9506-7D3F612E47C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v3:*:*:*:*:*:*:*", "matchCriteriaId": "5B1BBC61-8664-4452-93A7-DDB4D2E4C802", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4620_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C4F1B50C-FC5F-47F4-87BC-60E1BD3DD1F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4624l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "044F0375-DF2F-4D9B-AD7E-473D34165E8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v2:*:*:*:*:*:*:*", "matchCriteriaId": "2CEE9B72-5C4C-40C0-A8A7-9DF11655DA43", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v3:*:*:*:*:*:*:*", "matchCriteriaId": "4A0655CA-A88C-4632-9A18-560E3F63B2F7", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4627_v4:*:*:*:*:*:*:*", "matchCriteriaId": "8C1454DD-DA51-4CBC-8BB2-09D5AB5777DB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4628l_v4:*:*:*:*:*:*:*", "matchCriteriaId": "C6965851-3B29-4C21-9556-97FD731EAA85", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640:*:*:*:*:*:*:*", "matchCriteriaId": "52984FD2-44E0-4E91-B290-0376737EEF6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4C5D92E2-E718-4247-BA5D-DFE86C0F6AAE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v3:*:*:*:*:*:*:*", "matchCriteriaId": "DF933366-7503-4F8D-B7AA-F6A16210EC37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4640_v4:*:*:*:*:*:*:*", "matchCriteriaId": "4E2DAF5D-5BB7-49C6-8426-8B547505B6FC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4648_v3:*:*:*:*:*:*:*", "matchCriteriaId": "3EABB21D-D021-434B-B147-CAF687097A5B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650:*:*:*:*:*:*:*", "matchCriteriaId": "7609424D-95F1-4493-A20C-B1BA4EC6439D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v2:*:*:*:*:*:*:*", "matchCriteriaId": "966DC636-C802-4D9F-8162-652AFB931203", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v3:*:*:*:*:*:*:*", "matchCriteriaId": "A75794EB-A5AF-43F0-985F-D9E36F04C6D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650_v4:*:*:*:*:*:*:*", "matchCriteriaId": "31C2CFF0-98FD-4A0D-8949-D554B2FE53D4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4650l:*:*:*:*:*:*:*", "matchCriteriaId": "05F9217F-5028-4659-AA8E-F60548DE4D52", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4655_v3:*:*:*:*:*:*:*", "matchCriteriaId": "4AC769DC-CF2E-4A3C-A610-264F024E6279", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4655_v4:*:*:*:*:*:*:*", "matchCriteriaId": "9B2B1CBF-D155-49BC-81A4-4172F177A5C2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4657l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "370B2B32-519E-4373-8A04-5C5025D688BB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4660_v3:*:*:*:*:*:*:*", "matchCriteriaId": "83D9B562-C279-4A55-A347-F28FC4F9CD12", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4660_v4:*:*:*:*:*:*:*", "matchCriteriaId": "2A8C2BA0-48A8-4107-8681-A7C34C553D8C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4667_v3:*:*:*:*:*:*:*", "matchCriteriaId": "B1B009DE-A82F-4569-9B42-EC1EC4DA8A40", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4667_v4:*:*:*:*:*:*:*", "matchCriteriaId": "683B6E83-37FF-4F9B-915F-059EBB29DB53", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4669_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E218718F-4BE6-48B0-A204-9DD4A932A654", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5:4669_v4:*:*:*:*:*:*:*", "matchCriteriaId": "FB0AB327-B60A-473C-9D36-97766EE62D7D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DA249EE-4786-4E27-8787-5E8B88C2AEB9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEBD0529-1CF3-44E5-85B3-19A3323C9493", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1428l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D664EE97-07EC-410F-94C3-AEAB2C6A627D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620:-:*:*:*:*:*:*:*", "matchCriteriaId": "D31DB981-03B1-4A84-8D87-CD407C3C149F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CBD155D-89D9-4677-A621-4D7613BE65C6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D02BD0D4-FFFD-4355-97D8-170362F10B9F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "6635781A-2651-4EF2-A5AC-AEEEE63FDE6D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1630_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DCE6930-760A-48C0-B964-1E3ED6A8517C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1630_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E52DE90-DF96-4CE7-B8D1-226BA50E4D09", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8EB40E7-9B91-4106-B303-2B70AF395BFA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAB0D5CD-8AF3-409D-96A7-718641D4B90D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E420B0B-0CD5-41C7-B25A-3DB856055F9E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B0C295B-0D63-4BE7-830D-D927E00C301C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660:-:*:*:*:*:*:*:*", "matchCriteriaId": "605C340D-2220-4669-B827-9009CB099E8B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8791879D-2908-4F57-8DB3-6D24100A9108", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEBEDBBA-0427-4DE0-BA8D-737DE7DF80E6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1660_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E823DC5B-98BE-4656-BFBF-3A7018F8F213", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1680_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "64E8D558-ADE0-4358-9C76-7BD77BF23AA1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_1680_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7973B3D0-F244-4E26-88F5-A2D9BF2E4503", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2403:-:*:*:*:*:*:*:*", "matchCriteriaId": "68E6BAB9-CBA4-4362-BC82-00D2C5CC6FB4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2403_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD3F4BFF-3CBE-4E4B-8B29-B203F99CFD8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2407:-:*:*:*:*:*:*:*", "matchCriteriaId": "3F5CB567-4F86-4466-BE4D-BFF557ACAE0A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2407_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A52611B-6583-4660-90D7-C9472728072B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2408l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E80C6E89-B57C-47BB-8B95-50C03DFB3B96", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A9AB685B-FEE1-41EF-A046-1B34619E12A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB9F6724-967A-4AF0-9896-12BF6164B2CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2418l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC1116BF-12D7-47CC-98DB-18B200CF9C16", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2420:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FBB28DE-726B-4AF0-88A5-35987E1E648B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2420_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EA1DB22-8FBF-4CF6-AA96-5B68EE28877D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l:-:*:*:*:*:*:*:*", "matchCriteriaId": "1880E2B8-5E0E-4603-8D17-3ABA43D28179", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FAFBB92-1917-4238-832B-195FBE418271", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2428l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "91DFDF3F-9A3F-42B8-99A1-A3F76B198358", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430:-:*:*:*:*:*:*:*", "matchCriteriaId": "8778F972-BF34-482F-9FA7-71A77F6138E1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F288BB0-FE7A-4900-B227-BE80E4F4AADF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430l:-:*:*:*:*:*:*:*", "matchCriteriaId": "3A8DC53A-90C6-47FE-89F1-A1FE8B1C07A9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2430l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "57E16338-A094-4CA9-B77F-6FE42D3B422C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2438l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E07AB33-5351-487D-9602-495489C7C0B8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2440:-:*:*:*:*:*:*:*", "matchCriteriaId": "22115ED6-1707-4840-B0D1-AD36BC0C75A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2440_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7C633BC-831F-4CB7-9D62-16693444B216", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2448l:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CF5EE7E-F41B-44EC-9F69-7963B1BF1FB0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2448l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DD501E1-E78F-44C6-8A13-C29337B07EBE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450:-:*:*:*:*:*:*:*", "matchCriteriaId": "9085BA0B-B7E2-4908-90C0-B4183891C718", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2267CB8-0EE9-4DBD-AD5F-8A13BB62673C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450l:-:*:*:*:*:*:*:*", "matchCriteriaId": "81971C2F-137A-4F11-8C93-3B99D4CD1B58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2450l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "98E0BDAC-398E-406B-B2DB-AE049D6E98B1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2470:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCB66D7E-B465-4A8B-8CBD-7E93CCA2CD6F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2470_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "86AFDE6C-DE58-4C4D-882E-474EF6C3D934", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603:-:*:*:*:*:*:*:*", "matchCriteriaId": "950C6BF9-AA47-4287-AC01-D183237490FA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2355181D-D8EE-4F80-8280-13D5CBCF4779", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5209343F-66B0-4DC0-9111-E2E64CFF7409", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2603_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "720109A6-B79E-48E1-9AE7-7708B154788E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2608l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "82FF0DBD-AE13-4232-80F7-F4C2E2CC9721", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2608l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5E944ED-8C02-46B8-BF95-0CE4C352753B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609:-:*:*:*:*:*:*:*", "matchCriteriaId": "77AEA3D1-4846-46E2-9B80-20B19F00DC11", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "1576978F-E93D-4A47-90B6-6A4E3A7DE558", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D339FE5-001F-4005-88A5-CFFE37F9B63E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2609_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BDABA86-497E-497E-A5BA-46F913A4840A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD886F4C-DB6F-4DDD-9807-8BCBB625C226", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E16912A-7F6A-4A2B-B70F-D1FCD34BC7DB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2618l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4C454B7-E5F4-4AAE-B577-FD71FA002C8A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620:-:*:*:*:*:*:*:*", "matchCriteriaId": "38BE2781-3A06-4D62-AC8B-68B721DA526B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9AE4EA5-B8C8-4AE2-9614-F9DBDB4D79DC", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DA23772-2EB8-4BEE-8703-26D967EC4503", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "72DC766A-B1F9-4B83-9F9B-CF603EE476BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2623_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA594740-43C5-4F42-BA5B-00CA8AE7BB60", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2623_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "572B16E2-8118-43A0-9A80-5D96831D55FD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FB5C551-BADC-4A3A-93E5-2EBCA0704C51", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5383B7A3-1569-4FEB-B299-B87CE8C8A87B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2628l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A05BBDE0-6C47-4489-9455-7DA7D230ECA1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630:-:*:*:*:*:*:*:*", "matchCriteriaId": "1789AA69-EA31-44D1-82E6-228E48E18586", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A7D5FF-3B1F-4C64-BB81-7A349765520D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D93A92E9-C8D2-4F6E-A5CA-E8AFFEEC7E13", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "0F0498B3-393A-4C32-B338-E6014B956755", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l:-:*:*:*:*:*:*:*", "matchCriteriaId": "C451F752-6869-4AFA-BAE5-5C9A54427BF2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "83710FD1-099B-436D-9640-061D515E10BA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "517B71CE-6156-40E1-B068-A2B733E205E3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2630l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "11DEEEE5-5055-4CE1-962C-C5F075F4CC02", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637:-:*:*:*:*:*:*:*", "matchCriteriaId": "8718DDAB-3208-48CF-9BCE-54DA1257C16A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE1AA901-E822-4240-9D82-C9311E4F87B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1CDE3DF-8E79-4997-94EB-B517FFCAE55C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2637_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "12A0DE13-EB0B-493B-BC84-3AEB3D454776", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640:-:*:*:*:*:*:*:*", "matchCriteriaId": "1727697B-1F59-4E29-B036-C32E9076C523", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "E69E827C-C0D0-46C7-913A-1C1E02CEAACE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "2528F3F9-34DC-41DA-8926-382CB3EF5560", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2640_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E452C262-5A8D-4D97-BC7F-A4F5FF53A659", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D57BF69-D750-4278-98AA-976B0D28E347", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "76ADAE30-6CAD-4F5B-B6F7-C18953144C63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8A25D792-E21D-43EE-8B9D-67DE066DE5DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2643_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C669783-C058-4B4F-BB9A-84B2C4682247", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l:-:*:*:*:*:*:*:*", "matchCriteriaId": "159B088B-9A85-4CAA-854A-AA080E528F95", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "FBE74A94-FE8F-4749-A35A-AB7D57E24913", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "990AC341-0E67-4A81-87E9-EE3EFD9E847E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2648l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "53BC18B0-58F1-4477-9978-CA7383C197FB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650:-:*:*:*:*:*:*:*", "matchCriteriaId": "474992FB-842D-4661-A565-44AF2CD78693", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "476E1B79-5342-4895-96D7-E97DFC1F5334", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBD318D5-89A6-4E28-939C-C5B61396806B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "981AD3FF-1D14-4ECD-8B6F-BCEB7F2409AF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l:-:*:*:*:*:*:*:*", "matchCriteriaId": "A32C7E89-32ED-4328-9313-FA7D3DDBDC58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2792EED8-2CBD-478E-BC09-05FE830B3147", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e5_2650l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "97B1AF2F-6E48-4DBD-A60E-3088CA4C3771", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2803:*:*:*:*:*:*:*", "matchCriteriaId": "34E1691D-65B3-45E4-A544-8B29E38D569D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2820:*:*:*:*:*:*:*", "matchCriteriaId": "E42F2703-B8AB-410E-AF7B-CD0BE777F061", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2830:*:*:*:*:*:*:*", "matchCriteriaId": "31244C94-00A3-499C-A91A-1BEF2FB0E6B9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2850:*:*:*:*:*:*:*", "matchCriteriaId": "878FF6E8-8A6D-44CE-9DD1-2C912AB8A193", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "5078A95B-2BD8-4A37-A356-F53D1A53CB37", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2860:*:*:*:*:*:*:*", "matchCriteriaId": "0BFE67CD-DE53-4C4E-8245-35902AEFA6E8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2870:*:*:*:*:*:*:*", "matchCriteriaId": "9F231D31-3AAD-4C5D-A225-D2DF94486718", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "5998DF5D-E785-45EC-B8D0-1F4EC4F96D50", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "EADFD013-0BFB-427C-98E6-F9E4774DCBC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:2890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "58620B10-FEA6-456D-B6B5-2745F5DBE82D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4807:*:*:*:*:*:*:*", "matchCriteriaId": "E8F698B1-D9CF-4FE5-933D-EFCEA3056E3D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4858A1F0-97F2-4258-AB98-027BF1EC5117", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v3:*:*:*:*:*:*:*", "matchCriteriaId": "3C961A8B-EAFD-4F66-9432-BCC0D154ECCE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4809_v4:*:*:*:*:*:*:*", "matchCriteriaId": "052DE6CD-A1E7-4E81-B476-66EF451061C4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820:*:*:*:*:*:*:*", "matchCriteriaId": "3BE1AE1E-6FC0-41D8-857C-C5A99CAF5823", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v2:*:*:*:*:*:*:*", "matchCriteriaId": "751B3AC8-D45E-46B6-83D5-311B693F3C0D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v3:*:*:*:*:*:*:*", "matchCriteriaId": "9588277A-0B97-4408-9CF7-11271CDAADD6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4820_v4:*:*:*:*:*:*:*", "matchCriteriaId": "479FE854-85E5-4ED0-BFAF-2618C9053082", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830:*:*:*:*:*:*:*", "matchCriteriaId": "E048B9BF-77C8-49F7-9F2D-9999F79BA264", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v2:*:*:*:*:*:*:*", "matchCriteriaId": "6CD16D4D-E816-486D-96F4-5A2BF75B959F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v3:*:*:*:*:*:*:*", "matchCriteriaId": "169C558E-1A83-47D5-A66B-035BD1DD56FF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4830_v4:*:*:*:*:*:*:*", "matchCriteriaId": "D683E509-3FB2-4175-BCAB-4EB1B5C04958", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850:*:*:*:*:*:*:*", "matchCriteriaId": "6FCFA915-5445-4732-9F8F-D7561BA4177F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "63A9FD98-C22D-48F6-87A1-60791C818A1E", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v3:*:*:*:*:*:*:*", "matchCriteriaId": "85F99F24-1783-4E6E-BE61-04C2E80356ED", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4850_v4:*:*:*:*:*:*:*", "matchCriteriaId": "74CC7EB9-3F59-4C0A-B3A1-984BCCFB25BD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4860:*:*:*:*:*:*:*", "matchCriteriaId": "85289E4C-C813-4677-867D-EE8E98F4A1A3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4860_v2:*:*:*:*:*:*:*", "matchCriteriaId": "27C8150F-BEFA-406D-9F0D-E7CB187E26AB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4870:*:*:*:*:*:*:*", "matchCriteriaId": "1E807F90-819F-4103-B1F7-4CE46971BD63", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "CD93203F-71B9-4F87-B5D8-FD273451C8A2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "1E652C74-C48D-4F29-9E85-09325632443F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:4890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "99158191-3013-4182-8A53-5DFCA1E2C60A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8830:*:*:*:*:*:*:*", "matchCriteriaId": "F7E39A3E-7EAE-47C9-930B-58A980B73FC5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8837:*:*:*:*:*:*:*", "matchCriteriaId": "FFDA54BA-C00D-4890-9B7F-328257607B21", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8850:*:*:*:*:*:*:*", "matchCriteriaId": "1F5EFB1E-334C-4B55-8E2E-6AE19B34774D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8850_v2:*:*:*:*:*:*:*", "matchCriteriaId": "B8260DCA-2F0C-45F7-B35F-D489AF5639F2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8857_v2:*:*:*:*:*:*:*", "matchCriteriaId": "7778F81B-6D05-4666-B1D4-53DB0EC16858", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860:*:*:*:*:*:*:*", "matchCriteriaId": "5DC6706A-61F7-4AA0-B2FF-0FFDF739A644", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860_v3:*:*:*:*:*:*:*", "matchCriteriaId": "7EF1B16B-02F2-4ECA-938E-B5CDCFC67816", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8860_v4:*:*:*:*:*:*:*", "matchCriteriaId": "3C5501D8-1B0D-4F5A-AFD7-C63181D3281F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867_v3:*:*:*:*:*:*:*", "matchCriteriaId": "1751F0CE-A0D3-40E2-8EEC-D31141FE33A8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5FF9AFA7-BBE8-4229-94CB-5A9596728BA5", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8867l:*:*:*:*:*:*:*", "matchCriteriaId": "E23A777F-68A4-4217-A75A-4D8A27E6451A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870:*:*:*:*:*:*:*", "matchCriteriaId": "2CA27DFB-CDD1-4F52-86B3-DB2320A9C7B2", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v2:*:*:*:*:*:*:*", "matchCriteriaId": "392A4337-11F6-4980-A138-4FDBCAD0EBA4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E2E9BB67-F1FF-4190-889F-78B965CCE934", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8870_v4:*:*:*:*:*:*:*", "matchCriteriaId": "F4185A70-5D10-448E-A9AB-AA9D5CDF0FF8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v2:*:*:*:*:*:*:*", "matchCriteriaId": "35607317-0928-4297-A33E-D44BEE1BBEC9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v3:*:*:*:*:*:*:*", "matchCriteriaId": "D48323B1-7FEB-451F-A064-23E7CE7F6403", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880_v4:*:*:*:*:*:*:*", "matchCriteriaId": "29EF4E8A-EF37-4DCC-B5D4-DA89AF31DD18", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880l_v2:*:*:*:*:*:*:*", "matchCriteriaId": "F5763189-7980-4A72-92C9-1908FE9E15EF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8880l_v3:*:*:*:*:*:*:*", "matchCriteriaId": "C53ACD49-DA21-4DDE-A0AA-FCCD59D29886", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v2:*:*:*:*:*:*:*", "matchCriteriaId": "4326D350-EBC2-48E6-A2C6-0499F6826CEE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v3:*:*:*:*:*:*:*", "matchCriteriaId": "8594E6FE-B6DB-4343-B3DD-AEC19923DAF9", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8890_v4:*:*:*:*:*:*:*", "matchCriteriaId": "5BCADA00-E453-414D-9933-FCB43D21BBC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v2:*:*:*:*:*:*:*", "matchCriteriaId": "E62212D9-F707-4A8E-AB2A-A3985E7A4049", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v3:*:*:*:*:*:*:*", "matchCriteriaId": "561755A8-8AAD-4F41-8266-747EFDAF2D55", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8891_v4:*:*:*:*:*:*:*", "matchCriteriaId": "E6F4BB0F-DAF4-479B-B78A-7929C151AA1B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v2:*:*:*:*:*:*:*", "matchCriteriaId": "A207312E-1D35-4464-A111-22C4C793E146", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v3:*:*:*:*:*:*:*", "matchCriteriaId": "E9B16E32-07D5-445B-BAA5-4E4A0881BFC1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8893_v4:*:*:*:*:*:*:*", "matchCriteriaId": "7CF08F6B-2ECB-414C-82D7-C06085BF8B10", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_e7:8894_v4:*:*:*:*:*:*:*", "matchCriteriaId": "21032BE3-74D8-4C3F-B461-158F475B6853", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:5115:*:*:*:*:*:*:*", "matchCriteriaId": "2F9AC992-59B7-44EE-9FF3-567AC48938AA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:85115:*:*:*:*:*:*:*", "matchCriteriaId": "9DB6A2ED-D433-4A8E-8044-02571D0BBD92", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:85118:*:*:*:*:*:*:*", "matchCriteriaId": "4F819519-61B6-4ED0-8A23-509D6B26ACE1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:85119t:*:*:*:*:*:*:*", "matchCriteriaId": "E2D81C40-4BD0-4D25-95B4-44BE2011F117", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:85120:*:*:*:*:*:*:*", "matchCriteriaId": "85C3A39E-29D3-4C02-89A6-D5B3475EF592", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:85120t:*:*:*:*:*:*:*", "matchCriteriaId": "C70340A2-71DC-4D4D-BA2E-2B2E9ACDBE5F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:85122:*:*:*:*:*:*:*", "matchCriteriaId": "586DB792-9FF6-4253-9DAE-F3ACA3F1C489", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86126:*:*:*:*:*:*:*", "matchCriteriaId": "330576E9-3A92-4E22-BBC0-94A12ACE1032", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86126f:*:*:*:*:*:*:*", "matchCriteriaId": "5C644430-A075-40E1-8E35-15B97D8E9078", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86126t:*:*:*:*:*:*:*", "matchCriteriaId": "BAC094AC-0A3A-43F3-823A-089235D04A7C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86128:*:*:*:*:*:*:*", "matchCriteriaId": "5835FB20-922D-4478-8E4B-A53CCEE46198", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86130:*:*:*:*:*:*:*", "matchCriteriaId": "667A34BF-8699-477D-B30A-CEF0A36FC81B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86130f:*:*:*:*:*:*:*", "matchCriteriaId": "FE586938-ED60-40EA-8177-30267C7A3E58", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86130t:*:*:*:*:*:*:*", "matchCriteriaId": "CF902C36-0708-4B93-9504-5EA7EEDD628F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86132:*:*:*:*:*:*:*", "matchCriteriaId": "F0BC5EBB-2F1A-45C4-A8A7-122FBE4CBC93", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86134:*:*:*:*:*:*:*", "matchCriteriaId": "795F5800-8C06-426B-80AA-20F8E402ACAE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86134m:*:*:*:*:*:*:*", "matchCriteriaId": "173E49AF-95A9-4DAE-8C74-13CFCA8F0726", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86136:*:*:*:*:*:*:*", "matchCriteriaId": "ECE96391-4F25-4505-B757-D1F15ABD9FAA", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86138:*:*:*:*:*:*:*", "matchCriteriaId": "D037E4BA-35B9-42CB-9DDE-BED3DF49B958", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86138f:*:*:*:*:*:*:*", "matchCriteriaId": "43288516-FA4D-4D8F-9E69-EA27115EB43B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86138t:*:*:*:*:*:*:*", "matchCriteriaId": "13EF19E9-FE9A-4ED7-8D9E-848F10C088B0", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86140:*:*:*:*:*:*:*", "matchCriteriaId": "4EB72D0E-0E34-4EF3-98FB-52BE4A135D2A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86140m:*:*:*:*:*:*:*", "matchCriteriaId": "6DDE7F94-D938-40BA-A1F6-CE52D0B74ECB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86142:*:*:*:*:*:*:*", "matchCriteriaId": "B0E39247-337C-49D1-BF1B-504F2DA4EBA4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86142f:*:*:*:*:*:*:*", "matchCriteriaId": "A45FA7CB-6523-4042-8832-193D87102F57", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86142m:*:*:*:*:*:*:*", "matchCriteriaId": "61E350A6-9EC7-4E14-9790-040F154CE15D", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86144:*:*:*:*:*:*:*", "matchCriteriaId": "A8D70B4E-6B85-459C-AACA-59AB5CCC0B38", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86146:*:*:*:*:*:*:*", "matchCriteriaId": "565EB5E9-3B86-4353-BFF6-3F5D27140B42", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86148:*:*:*:*:*:*:*", "matchCriteriaId": "A32CBB5D-392A-4CD1-82D3-A97D822FADFE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86148f:*:*:*:*:*:*:*", "matchCriteriaId": "383E08FE-EE7A-4E41-9AAD-786779D4B5E3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86150:*:*:*:*:*:*:*", "matchCriteriaId": "2D50C6D5-3452-4214-B3FF-9F8009D75C3A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86152:*:*:*:*:*:*:*", "matchCriteriaId": "A93954C6-9B01-4CEB-8925-5D3F415AFC1B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_gold:86154:*:*:*:*:*:*:*", "matchCriteriaId": "7B7D54E5-6EDE-44DE-AEA6-F7F76E3EC36F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8153:*:*:*:*:*:*:*", "matchCriteriaId": "8CB2949C-4699-49EF-83EB-31199E0CE2DF", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8156:*:*:*:*:*:*:*", "matchCriteriaId": "66C169DC-EEFE-4DE6-A3D0-65B606527240", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8158:*:*:*:*:*:*:*", "matchCriteriaId": "FD28227A-8888-43B2-BC41-8D54B49DA58C", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160:*:*:*:*:*:*:*", "matchCriteriaId": "7984BAEA-4518-4E17-830E-B34D09648BD8", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160f:*:*:*:*:*:*:*", "matchCriteriaId": "2C2214E5-491E-448F-A4B6-A497FB44D722", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160m:*:*:*:*:*:*:*", "matchCriteriaId": "2AE93013-C262-46A5-8E77-D647881EE632", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8160t:*:*:*:*:*:*:*", "matchCriteriaId": "85B53CEC-943F-4966-8EC1-CB2C6AD6A15B", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8164:*:*:*:*:*:*:*", "matchCriteriaId": "EEAC04A3-EBE3-406B-B784-A3547162ECE4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8168:*:*:*:*:*:*:*", "matchCriteriaId": "15720FFE-B2A4-4347-BCD7-DFA6774C0B8F", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170:*:*:*:*:*:*:*", "matchCriteriaId": "50F46B0E-C746-44B4-B343-E3DCAB4B98DE", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8170m:*:*:*:*:*:*:*", "matchCriteriaId": "5AE30903-4F75-4D71-A8BB-44D1099E9837", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176:*:*:*:*:*:*:*", "matchCriteriaId": "98311EAA-26C8-4092-8BE5-4E7BEAA68DD4", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176f:*:*:*:*:*:*:*", "matchCriteriaId": "DB8CF348-811C-4342-ACB9-AFCABCC34331", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8176m:*:*:*:*:*:*:*", "matchCriteriaId": "71998EC5-EC0F-496C-B658-3CD91D824944", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_platinum:8180:*:*:*:*:*:*:*", "matchCriteriaId": "A1F19B2A-E7A1-4B97-AC40-02B0D3673555", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4108:*:*:*:*:*:*:*", "matchCriteriaId": "CB6387C9-C0A8-4B26-BC62-802775CD0AD3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4109t:*:*:*:*:*:*:*", "matchCriteriaId": "EFEB0164-77C2-4EC2-92FD-5FCE246119CB", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4110:*:*:*:*:*:*:*", "matchCriteriaId": "FDB20210-337C-4220-8CA1-F4B2BC54EBC3", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4112:*:*:*:*:*:*:*", "matchCriteriaId": "F699569F-4F52-4CC0-90D9-CC4CBC32428A", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114:*:*:*:*:*:*:*", "matchCriteriaId": "CBAED22B-D097-49C4-ADDF-4B3F3E1262D6", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4114t:*:*:*:*:*:*:*", "matchCriteriaId": "ACF5C3C2-EE69-4DE7-A76C-C797192EE7A1", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116:*:*:*:*:*:*:*", "matchCriteriaId": "7756B588-5A63-4508-8BDD-92DB8CB0F4AD", "vulnerable": true }, { "criteria": "cpe:2.3:h:intel:xeon_silver:4116t:*:*:*:*:*:*:*", "matchCriteriaId": "316E26AE-67A5-4E75-8F9B-ECF4A03AED51", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:arm:cortex-a:15:*:*:*:*:*:*:*", "matchCriteriaId": "001AB619-157E-40B4-B86C-5DB18245D62F", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:57:*:*:*:*:*:*:*", "matchCriteriaId": "38D51E27-28A3-47A1-9C36-1A223858E352", "vulnerable": true }, { "criteria": "cpe:2.3:h:arm:cortex-a:72:*:*:*:*:*:*:*", "matchCriteriaId": "365DF3EF-E7D1-41FC-8382-D3B095542D59", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:mrg_realtime:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "AFB0FFE3-4BE1-4024-BCC6-1B87074DE2E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "9DAA72A4-AC7D-4544-89D4-5B07961D5A95", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:8:*:*:*:*:*:*:*", "matchCriteriaId": "E8B8C725-34CF-4340-BE7B-37E58CF706D6", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:9:*:*:*:*:*:*:*", "matchCriteriaId": "F40C26BE-56CB-4022-A1D8-3CA0A8F87F4B", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:10:*:*:*:*:*:*:*", "matchCriteriaId": "E722FEF7-58A6-47AD-B1D0-DB0B71B0C7AA", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:12:*:*:*:*:*:*:*", "matchCriteriaId": "4D4AC996-B340-4A14-86F7-FF83B4D5EC8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:openstack:13:*:*:*:*:*:*:*", "matchCriteriaId": "704CFA1A-953E-4105-BFBE-406034B83DED", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:virtualization_manager:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "E938A8EB-68FE-427B-B67E-C880FBF54BBE", "vulnerable": true }, { "criteria": "cpe:2.3:a:redhat:virtualization_manager:4.3:*:*:*:*:*:*:*", "matchCriteriaId": "9FA1A18F-D997-4121-A01B-FD9B3BF266CF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:6.7:*:*:*:*:*:*:*", "matchCriteriaId": "967EC28A-607F-48F4-AD64-5E3041C768F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "807C024A-F8E8-4B48-A349-4C68CD252CA1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "F96E3779-F56A-45FF-BB3D-4980527D721E", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "0CF73560-2F5B-4723-A8A1-9AADBB3ADA00", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "5BF3C7A5-9117-42C7-BEA1-4AA378A582EF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "83737173-E12E-4641-BC49-0BD84A6B29D0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:5.9:*:*:*:*:*:*:*", "matchCriteriaId": "92C9F1C4-55B0-426D-BB5E-01372C23AF97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.4:*:*:*:*:*:*:*", "matchCriteriaId": "AF83BB87-B203-48F9-9D06-48A5FE399050", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "1F3BEFDB-5156-4E1C-80BB-8BE9FEAA7623", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "16E6D998-B41D-4B49-9E00-8336D2E40A4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "1C8D871B-AEA1-4407-AEE3-47EC782250FF", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "13E02156-E748-4820-B76F-7074793837E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "6755B6AD-0422-467B-8115-34A60B1D1A40", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D5F7E11E-FB34-4467-8919-2B6BEAABF665", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "C11E6FB0-C8C0-4527-9AA0-CB9B316F8F43", "vulnerable": true }, { "criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:*:*:*:*", "matchCriteriaId": "1F3EFED2-F6BC-46D9-AB22-D5ED87EF4549", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*", "matchCriteriaId": "815D70A8-47D3-459C-A32C-9FEACA0659D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "matchCriteriaId": "F7016A2A-8365-4F1A-89A2-7A19F2BCAE5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:17.10:*:*:*:*:*:*:*", "matchCriteriaId": "9070C9D8-A14A-467F-8253-33B966C16886", "vulnerable": true }, { "criteria": "cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*", "matchCriteriaId": "23A7C53F-B80F-4E6A-AFA9-58EEA84BE11D", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:itc1500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3BC8E8CF-2507-49DE-BF54-CCF16A2861F5", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:itc1500:3:*:*:*:*:*:*:*", "matchCriteriaId": "742BCB01-8856-4F6F-86B6-A1DB878C3062", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:itc1500_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "5178C320-CDB7-4180-951B-BFBCFAFB7FAA", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:itc1500_pro:3:*:*:*:*:*:*:*", "matchCriteriaId": "EEE4079D-C47A-4D57-9B37-947DE42F8A60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:itc1900_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4E1F645D-141D-4BCB-8F90-4A7BCC08988B", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:itc1900:3:*:*:*:*:*:*:*", "matchCriteriaId": "B203F60B-0694-4B46-96CB-E8C5E4375E85", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:itc1900_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F702CAFB-3ED9-4185-9781-1DAA8A0B01DD", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:itc1900_pro:3:*:*:*:*:*:*:*", "matchCriteriaId": "0C231846-D2BC-428F-AADE-A7E09DB3A547", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:itc2200_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CBA817DF-52C1-4FCC-A661-F81D923A18EF", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:itc2200:3:*:*:*:*:*:*:*", "matchCriteriaId": "D00016F2-3E88-4F57-AD2B-378153E73956", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:itc2200_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B30A4009-B0DD-492E-AEC1-985261707AC3", "versionEndExcluding": "3.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:itc2200_pro:3:*:*:*:*:*:*:*", "matchCriteriaId": "C4ED0315-9898-4110-96AB-5C198357ED83", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:oracle:local_service_management_system:*:*:*:*:*:*:*:*", "matchCriteriaId": "7E49B728-E8DE-4B23-9564-7BFDED6F299E", "versionEndIncluding": "13.3", "versionStartIncluding": "13.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:oracle:solaris:11:*:*:*:*:*:*:*", "matchCriteriaId": "8E8C192B-8044-4BF9-9F1F-57371FC0E8FD", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ruggedcom_ape_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48B6FA71-3077-4202-A9A1-CBDF9AE2521E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ruggedcom_ape:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E4F2A68-3715-4F86-BEEC-8C4D4341B100", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_et_200_sp_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B42251AC-8FED-4BDE-93B3-5203F32D6313", "versionEndExcluding": "2.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_et_200_sp:-:*:*:*:*:*:*:*", "matchCriteriaId": "4A661231-49DF-477F-954A-702839A9266B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CAD5D20-80DB-4A09-AFBA-BCA594DE3B93", "versionEndExcluding": "18.01.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADAD919-32C1-49D2-A419-C9A803DB6250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "503E551C-FC5F-4ABC-8DEA-E360701F0B33", "versionEndExcluding": "22.01.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc3000_smart_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "664FC58B-33E9-43E4-A87E-5C78F935C332", "versionEndExcluding": "1.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc3000_smart:2:*:*:*:*:*:*:*", "matchCriteriaId": "4809A582-BC22-41A0-815A-32CF2BA197F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc347e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45509778-898E-45DF-B14E-68B6C456B9B6", "versionEndExcluding": "1.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc347e:-:*:*:*:*:*:*:*", "matchCriteriaId": "49D276DE-950F-4A61-BA13-DD5D07A17571", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2AB7B8D-D6FB-43A0-865D-58D4CDF96C06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427c:-:*:*:*:*:*:*:*", "matchCriteriaId": "DEA7336B-85CA-4A15-B7A6-D20B67041CCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FBA3B550-EB8B-4EBB-A1F0-14152A6791DD", "versionEndExcluding": "17.0x.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*", "matchCriteriaId": "46CC8AFE-ED6C-4A50-AC80-D2309E03FAE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33F546AF-8F80-4E0A-9B92-86E3A1F931C0", "versionEndExcluding": "21.01.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D55FC2D5-DCF6-4A24-873F-D0CF80DB3921", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477c:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E4335E3-D2BB-4465-BBC8-611C7F85BEF8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "435F7F3C-7483-4101-BC0A-E1E2BB66D6C1", "versionEndExcluding": "17.0x.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*", "matchCriteriaId": "754A6744-5194-4A99-BD3B-944A8707C80F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B5B6E6B-16A0-4236-AABE-82385B53EC78", "versionEndExcluding": "21.01.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "224D0968-6414-41F7-8929-C69D524A416F", "versionEndExcluding": "21.01.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D476D093-4A97-499C-B40D-7A301BC9AA2E", "versionEndExcluding": "r1.30.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DD4A97-1648-4C7F-A5A0-6899BD13A617", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "940CCA5A-EC4A-4D46-B56C-4FC3698707E0", "versionEndExcluding": "r1.23.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "203B30DB-52C6-48ED-8A94-76F775DA1198", "versionEndExcluding": "15.02.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD1A57A9-F6E5-4672-BD22-09EF5522CA10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "790D244A-AC3D-4BBC-9139-A90048FD375A", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "05466B50-76ED-41E7-87DC-96CA95AAC6A2", "versionEndExcluding": "15.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E752006C-6D94-4B14-B3A5-C9BB94141BDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C046182-BB33-41D0-B041-1566B8041917", "versionEndExcluding": "19.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DE74300-E061-452E-AD1D-6DD7C2C62729", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F232B7B4-D633-47ED-B435-6EB6530019F4", "versionEndExcluding": "15.02.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F55B7-DE3D-4D74-A7E7-9BCB8F7B114A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9C0D4DB3-FBA2-4868-8A38-5D81E622C709", "versionEndExcluding": "15.02.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FFD2D72-5464-4B86-BACB-61F55A081C3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE4A7C13-6F81-4629-9C28-9202028634AE", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D87239-40C1-4038-B734-D77AC4DDD571", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8014E0E5-F880-4886-8294-7EC971D5BBF9", "versionEndExcluding": "15.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*", "matchCriteriaId": "687E1212-EC5A-47BA-ACAB-74F6C98B7C34", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93485235-481B-4BAF-BB7A-81BB5AA1BC53", "versionEndExcluding": "19.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F37D88-E086-4060-8420-BD0F8D8FF580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD949046-46E5-48C9-883B-92F04926E8BC", "versionEndExcluding": "23.01.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_s7-1500_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8F81F41D-480F-4443-927E-00607DD40BF5", "versionEndExcluding": "2.6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_s7-1500:-:*:*:*:*:*:*:*", "matchCriteriaId": "30DDEA9B-E1BF-4572-8E12-D13C54603E77", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_p320-4e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B8102F17-F6DA-4EE9-B533-EA806D9E7F7E", "versionEndExcluding": "17.0x.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_p320-4e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EE09494-625A-4FF7-8B3E-6510FF9AFC9C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinumerik_840_d_sl_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE8095A5-3677-4024-9437-C46DA382C280", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinumerik_840_d_sl:-:*:*:*:*:*:*:*", "matchCriteriaId": "9565FE15-A705-4D0A-BFA3-30871FDCF9DB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinumerik_pcu_50.5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8E16526D-CCA8-45B2-829E-4562A7440356", "versionEndExcluding": "15.02.15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinumerik_pcu_50.5:-:*:*:*:*:*:*:*", "matchCriteriaId": "9220E9B5-5A0E-4F90-9A2C-B4692E937DBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinumerik_tcu_30.3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE42ABA9-E5D8-4589-B111-AE191747E03D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinumerik_tcu_30.3:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E53E94C-0F57-4A71-B919-C34984A5ADB6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinema_remote_connect_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2051E518-7CCD-4B49-9705-BDDC37177BE0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinema_remote_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF739F2D-744A-44CE-8DA7-F89A14239943", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mitel:micloud_management_portal:*:*:*:*:*:*:*:*", "matchCriteriaId": "417953F8-F722-4CD0-BC59-1192A4533505", "vulnerable": true }, { "criteria": "cpe:2.3:a:mitel:micollab:-:*:*:*:*:*:*:*", "matchCriteriaId": "61E87F32-4157-42A3-A758-36AA2A4D7AFD", "vulnerable": true }, { "criteria": "cpe:2.3:a:mitel:mivoic_mx-one:-:*:*:*:*:*:*:*", "matchCriteriaId": "4CEABF0C-99D9-415D-B8CB-B632C644664E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mitel:mivoice_5000:-:*:*:*:*:*:*:*", "matchCriteriaId": "150C225A-C4A0-4CC7-91AA-8F341D8152F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mitel:mivoice_border_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "762B1578-25AD-4ACC-A1AE-C325155F49F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:mitel:mivoice_business:-:*:*:*:*:*:*:*", "matchCriteriaId": "E561C59C-9E46-4FE1-8DA7-5E524FB9D87E", "vulnerable": true }, { "criteria": "cpe:2.3:a:mitel:mivoice_connect:-:*:*:*:*:*:*:*", "matchCriteriaId": "B1077221-796B-44E7-A278-579F41BA5DE0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mitel:open_integration_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D6F3481-E5DF-452A-AE3C-1ED648B54234", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:sonicwall:cloud_global_management_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BD39AA6-8D0B-405C-8A69-9264C82BCDAC", "vulnerable": true }, { "criteria": "cpe:2.3:a:sonicwall:email_security:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CD00A81-9A08-4C24-B720-BC7C99DCF19B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sonicwall:global_management_system:-:*:*:*:*:*:*:*", "matchCriteriaId": "2008DF4A-1AC8-4CC0-8649-823B3B6BD329", "vulnerable": true }, { "criteria": "cpe:2.3:a:sonicwall:secure_mobile_access:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AD3D92A-D07F-4087-81AF-0FA78E290DA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:sonicwall:web_application_firewall:-:*:*:*:*:*:*:*", "matchCriteriaId": "0220EB54-D74B-451C-8FA6-D71BF39B578F", "vulnerable": true }, { "criteria": "cpe:2.3:o:sonicwall:sonicosv:-:*:*:*:*:*:*:*", "matchCriteriaId": "1ED1C215-1656-4113-B571-9479FDEB9ACF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:schneider-electric:struxureware_data_center_expert:*:*:*:*:*:*:*:*", "matchCriteriaId": "6CB56955-1A47-4F6C-A354-8BBAE7534504", "versionEndExcluding": "7.6.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:redhat:virtualization:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "6BBD7A51-0590-4DDF-8249-5AFA8D645CB6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "142AD0DD-4CF3-4D74-9442-459CE3347E3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:nvidia:jetson_tx1:*:*:*:*:*:*:*:*", "matchCriteriaId": "D05993AD-FABF-49A6-B3F5-6DF1B0835321", "versionEndExcluding": "r28.3", "vulnerable": true }, { "criteria": "cpe:2.3:a:nvidia:jetson_tx2:*:*:*:*:*:*:*:*", "matchCriteriaId": "1455BBEB-871A-41FE-A4BD-6DC583777252", "versionEndExcluding": "r28.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:h:microsoft:surface:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC248D3F-1D6D-48FC-94BA-3C24A182D172", "vulnerable": true }, { "criteria": "cpe:2.3:h:microsoft:surface_book:-:*:*:*:*:*:*:*", "matchCriteriaId": "987ECFC7-D504-488D-B977-FEC182819567", "vulnerable": true }, { "criteria": "cpe:2.3:h:microsoft:surface_book:2:*:*:*:*:*:*:*", "matchCriteriaId": "F75F0910-3EED-4365-B03E-B3295A762656", "vulnerable": true }, { "criteria": "cpe:2.3:h:microsoft:surface_pro:3:*:*:*:*:*:*:*", "matchCriteriaId": "12C0B9FE-09FD-4991-BE14-499FFC728EDD", "vulnerable": true }, { "criteria": "cpe:2.3:h:microsoft:surface_pro:4:*:*:*:*:*:*:*", "matchCriteriaId": "7585B88F-58FA-4DF2-AA99-185731253A05", "vulnerable": true }, { "criteria": "cpe:2.3:h:microsoft:surface_pro:1796:*:*:*:*:*:*:*", "matchCriteriaId": "AFD7F77C-F02B-4EAF-8836-C97ACB5AFEA8", "vulnerable": true }, { "criteria": "cpe:2.3:h:microsoft:surface_pro_with_lte_advanced:1807:*:*:*:*:*:*:*", "matchCriteriaId": "A98AB09C-24D8-4B58-9F4A-EF6B42EB27C8", "vulnerable": true }, { "criteria": "cpe:2.3:h:microsoft:surface_studio:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FF4194A-8194-4727-8C10-4F44D5041011", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:-:*:*:*:*:*:*:*", "matchCriteriaId": "21540673-614A-4D40-8BD7-3F07723803B0", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1607:*:*:*:*:*:*:*", "matchCriteriaId": "E01A4CCA-4C43-46E0-90E6-3E4DBFBACD64", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1703:*:*:*:*:*:*:*", "matchCriteriaId": "AEE2E768-0F45-46E1-B6D7-087917109D98", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1709:*:*:*:*:*:*:*", "matchCriteriaId": "83B14968-3985-43C3-ACE5-8307196EFAE3", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1803:*:*:*:*:*:*:*", "matchCriteriaId": "7CB85C75-4D35-480E-843D-60579EC75FCB", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_10:1809:*:*:*:*:*:*:*", "matchCriteriaId": "6B8F3DD2-A145-4AF1-8545-CC42892DA3D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_7:-:sp1:*:*:*:*:*:*", "matchCriteriaId": "C2B1C231-DE19-4B8F-A4AA-5B3A65276E46", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:r2:sp1:*:*:*:*:x64:*", "matchCriteriaId": "AF07A81D-12E5-4B1D-BFF9-C8D08C32FF4F", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2008:sp2:*:*:*:*:*:*:*", "matchCriteriaId": "66CAFDB7-9D41-4E67-AB83-5EB104551FF5", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7DF96F8-BA6A-4780-9CA3-F719B3F81074", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2012:r2:*:*:*:*:*:*:*", "matchCriteriaId": "DB18C4CE-5917-401E-ACF7-2747084FD36E", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:-:*:*:*:*:*:*:*", "matchCriteriaId": "041FF8BA-0B12-4A1F-B4BF-9C4F33B7C1E7", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1709:*:*:*:*:*:*:*", "matchCriteriaId": "5B454BFE-D3AB-4CDC-B79B-F60EA3F57DBA", "vulnerable": true }, { "criteria": "cpe:2.3:o:microsoft:windows_server_2016:1803:*:*:*:*:*:*:*", "matchCriteriaId": "CAACE735-003E-4ACB-A82E-C0CF97D7F013", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Systems with microprocessors utilizing speculative execution and speculative execution of memory reads before the addresses of all prior memory writes are known may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis, aka Speculative Store Bypass (SSB), Variant 4." }, { "lang": "es", "value": "Los sistemas con microprocesadores que emplean la ejecuci\u00f3n especulativa y que realizan la ejecuci\u00f3n especulativa de lecturas de memoria antes de que se conozcan las direcciones de todas las anteriores escrituras de memoria podr\u00edan permitir la divulgaci\u00f3n no autorizada de informaci\u00f3n a un atacante con acceso de usuario local mediante un an\u00e1lisis de canal lateral. Esto tambi\u00e9n se conoce como Speculative Store Bypass (SSB), Variant 4." } ], "id": "CVE-2018-3639", "lastModified": "2024-11-21T04:05:48.867", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-05-22T12:29:00.250", "references": [ { "source": "secure@intel.com", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html" }, { "source": "secure@intel.com", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" }, { "source": "secure@intel.com", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "http://support.lenovo.com/us/en/solutions/LEN-22133" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/10/1" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/10/2" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/10/5" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104232" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040949" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1042004" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-263.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1629" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1630" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1632" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1633" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1635" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1636" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1637" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1638" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1639" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1640" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1641" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1642" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1643" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1644" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1645" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1646" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1647" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1648" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1649" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1650" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1651" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1652" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1653" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1654" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1655" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1656" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1657" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1658" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1659" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1660" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1661" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1662" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1663" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1664" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1665" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1666" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1667" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1668" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1669" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1674" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1675" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1676" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1686" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1688" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1689" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1690" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1696" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1710" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1711" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1737" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1738" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1826" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1965" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1967" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1997" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2001" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2003" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2006" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2060" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2161" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2162" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2164" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2171" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2172" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2216" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2228" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2246" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2250" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2258" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2289" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2309" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2328" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2363" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2364" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3396" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3397" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3398" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3399" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3400" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3401" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3402" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3407" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3423" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3424" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3425" }, { "source": "secure@intel.com", "tags": [ "Broken Link" ], "url": "https://access.redhat.com/errata/RHSA-2019:0148" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:1046" }, { "source": "secure@intel.com", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "source": "secure@intel.com", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787" }, { "source": "secure@intel.com", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004" }, { "source": "secure@intel.com", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180521-0001/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.citrix.com/article/CTX235225" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03850en_us" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3651-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3652-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3653-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3653-2/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3654-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3654-2/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3655-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3655-2/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3679-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3680-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3756-1/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3777-3/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4210" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4273" }, { "source": "secure@intel.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44695/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_23" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ncas/alerts/TA18-141A" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00058.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00059.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00007.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://support.lenovo.com/us/en/solutions/LEN-22133" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.fujitsu.com/global/support/products/software/security/products-f/cve-2018-3639e.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/10/1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/10/2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "http://www.openwall.com/lists/oss-security/2020/06/10/5" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104232" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040949" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1042004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://xenbits.xen.org/xsa/advisory-263.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1629" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1630" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1632" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1636" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1638" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1639" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1640" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1641" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1643" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1644" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1645" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1646" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1647" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1648" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1649" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1650" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1651" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1652" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1653" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1654" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1655" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1656" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1657" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1658" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1659" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1660" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1661" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1662" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1663" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1665" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1666" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1667" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1668" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1669" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1674" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1675" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1686" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1688" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1689" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1690" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1696" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1710" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1711" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1737" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1738" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1826" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1854" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1965" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1967" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:1997" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2060" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2161" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2162" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2164" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2171" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2172" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2216" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2228" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2246" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2250" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2258" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2289" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2309" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2328" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2363" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2364" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2387" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2394" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2396" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:2948" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3396" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3397" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3398" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3399" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3400" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3401" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3402" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3407" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3423" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3424" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2018:3425" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link" ], "url": "https://access.redhat.com/errata/RHSA-2019:0148" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://access.redhat.com/errata/RHSA-2019:1046" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Patch", "Third Party Advisory" ], "url": "https://bugs.chromium.org/p/project-zero/issues/detail?id=1528" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-268644.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-505225.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://developer.arm.com/support/arm-security-updates/speculative-processor-vulnerability" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/07/msg00038.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2018/09/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Third Party Advisory" ], "url": "https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://nvidia.custhelp.com/app/answers/detail/a_id/4787" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory", "Vendor Advisory" ], "url": "https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV180012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2018-0004" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Mailing List", "Third Party Advisory" ], "url": "https://seclists.org/bugtraq/2019/Jun/36" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180521-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.citrix.com/article/CTX235225" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03850en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.oracle.com/knowledge/Sun%20Microsystems/2481872_1.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180521-cpusidechannel" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3651-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3652-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3653-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3653-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3654-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3654-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3655-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3655-2/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3679-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3680-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3756-1/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://usn.ubuntu.com/3777-3/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4210" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.debian.org/security/2018/dsa-4273" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://www.exploit-db.com/exploits/44695/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00115.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/180049" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.mitel.com/en-ca/support/security-advisories/mitel-product-security-advisory-18-0006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/security-alerts/cpujul2020.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_23" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.us-cert.gov/ncas/alerts/TA18-141A" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-203" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-03 02:15
Modified
2024-11-21 06:27
Severity ?
Summary
An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.08.41, Kernel 5.1 before 05.16.41, Kernel 5.2 before 05.26.41, Kernel 5.3 before 05.35.41, and Kernel 5.4 before 05.42.20. A stack-based buffer overflow leads toarbitrary code execution in UEFI DisplayTypeDxe DXE driver.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20220216-0008/ | Third Party Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge | Vendor Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge/SA-2022006 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20220216-0008/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge/SA-2022006 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "A64DE17F-735B-490B-A4AD-8606684DDB5D", "versionEndExcluding": "5.08.41", "versionStartIncluding": "5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE9D6D0-77EF-41CE-ACB2-A43B0543F9C7", "versionEndExcluding": "5.16.41", "versionStartIncluding": "5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "ADDAD8E2-7468-4D96-8A9F-8C2BB0E8EACB", "versionEndExcluding": "5.26.41", "versionStartIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "7AF0CD01-CD57-41D5-9827-437F0683E13B", "versionEndExcluding": "5.35.41", "versionStartIncluding": "5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "612CCC25-B065-44F6-A531-E310A2A1B9A6", "versionEndExcluding": "5.42.20", "versionStartIncluding": "5.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "324ADC7E-AECD-4B7D-8571-5399542C2BF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "480C5657-5C05-40F5-B76A-E67119727ED8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AEB5AD1-3973-4150-BEA2-C9DE0B98222F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F63C0B17-60E2-4240-92FD-4B7C7D8F2C8B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc227g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3F52F29-0ACF-4ECC-927A-0CB27399E5D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D1E85AC-1305-4C5E-AD8B-39B2654F6057", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc277g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F203C449-2B5C-47A1-BF3D-8DCFD29F0B18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*", "matchCriteriaId": "320F5752-86B3-4C08-89D0-02272753A6D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc327g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A37FB5EC-BB64-472C-81FC-8EEF238E3C12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC7303D1-CC95-42C7-B843-C3B3B3336669", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc377g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45013BCA-3897-4D58-81FA-D8CB9D19268C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDD6F034-BC50-4223-AE5D-319F04C866A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6422BF3-01B7-443B-BD2B-80E45D7C3F5F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "696F47E6-C1CA-4A58-A91F-4B3EA92954AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F712060C-ECDB-4BC7-B9B9-468B41DE615B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D511C170-65E5-416D-B7CE-557A503F25AE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "577C19F5-82ED-46DF-91CC-A074DE99EBDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEF4592C-5DB3-45F4-B354-59701BBA0C08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87F0538B-ED6E-40C7-9C2A-4C5DC3D2935E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.08.41, Kernel 5.1 before 05.16.41, Kernel 5.2 before 05.26.41, Kernel 5.3 before 05.35.41, and Kernel 5.4 before 05.42.20. A stack-based buffer overflow leads toarbitrary code execution in UEFI DisplayTypeDxe DXE driver." }, { "lang": "es", "value": "Se ha descubierto un problema en el Kernel versi\u00f3n 5.0 de InsydeH2O antes de 05.08.41, el Kernel versi\u00f3n 5.1 antes de 05.16.41, el Kernel versi\u00f3n 5.2 antes de 05.26.41, el Kernel versi\u00f3n 5.3 antes de 05.35.41 y el Kernel versi\u00f3n 5.4 antes de 05.42.20. Un desbordamiento del b\u00fafer basado en la pila conduce a la ejecuci\u00f3n de c\u00f3digo arbitrario en el controlador UEFI DisplayTypeDxe DXE" } ], "id": "CVE-2021-42059", "lastModified": "2024-11-21T06:27:09.830", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-03T02:15:07.250", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220216-0008/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2022006" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220216-0008/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2022006" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-787" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-09-12 19:29
Modified
2024-11-21 04:05
Severity ?
Summary
Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "503E551C-FC5F-4ABC-8DEA-E360701F0B33", "versionEndExcluding": "22.01.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "33F546AF-8F80-4E0A-9B92-86E3A1F931C0", "versionEndExcluding": "21.01.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B5B6E6B-16A0-4236-AABE-82385B53EC78", "versionEndExcluding": "21.01.09", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D476D093-4A97-499C-B40D-7A301BC9AA2E", "versionEndExcluding": "r1.30.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_pc547e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6A757F1-E478-4A3D-8D5F-C996E176A11A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_pc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "30F129DB-51AC-4F40-A0D1-AB5CF90D9C2D", "versionEndExcluding": "r1.23.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "790D244A-AC3D-4BBC-9139-A90048FD375A", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0C046182-BB33-41D0-B041-1566B8041917", "versionEndExcluding": "19.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "8DE74300-E061-452E-AD1D-6DD7C2C62729", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BE4A7C13-6F81-4629-9C28-9202028634AE", "versionEndExcluding": "19.02.11", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D87239-40C1-4038-B734-D77AC4DDD571", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "93485235-481B-4BAF-BB7A-81BB5AA1BC53", "versionEndExcluding": "19.01.14", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F37D88-E086-4060-8420-BD0F8D8FF580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "AD949046-46E5-48C9-883B-92F04926E8BC", "versionEndExcluding": "23.01.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:converged_security_management_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C23AFAB4-B286-4FD6-ABC3-86B2881E271C", "versionEndExcluding": "12.0.5", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D5FAD938-027A-406F-9E7C-1BFD992839F4", "versionEndExcluding": "12.0.5", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "63591E72-6038-4417-BA10-54180507AF0F", "versionEndExcluding": "11.0", "versionStartIncluding": "9.0.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple memory leaks in Intel AMT in Intel CSME firmware versions before 12.0.5 may allow an unauthenticated user with Intel AMT provisioned to potentially cause a partial denial of service via network access." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en Intel AMT en el firmware Intel CSME en versiones anteriores a la 12.0.5 podr\u00edan permitir que un usuario no autenticado con Intel AMT provisionado provoque una denegaci\u00f3n de servicio (DoS) parcial mediante acceso de red." } ], "id": "CVE-2018-3658", "lastModified": "2024-11-21T04:05:51.020", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 1.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-09-12T19:29:02.967", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106996" }, { "source": "secure@intel.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/106996" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-377318.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://ics-cert.us-cert.gov/advisories/ICSA-19-043-05" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20180924-0003/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03876en_us" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00141.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-772" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-03 02:15
Modified
2024-11-21 06:09
Severity ?
Summary
An issue was discovered in Kernel 5.x in Insyde InsydeH2O, affecting HddPassword. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20220222-0004/ | Third Party Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge | Vendor Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge/SA-2022014 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20220222-0004/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge/SA-2022014 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "8C029DED-CC74-4AFB-B5D0-C1FD8237DCAE", "versionEndExcluding": "5.16.23", "versionStartIncluding": "5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "AC748480-3FCF-4F8B-A726-C1DDEA3C78A0", "versionEndExcluding": "5.26.23", "versionStartIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "C88BDB9B-D893-47BA-901C-F2055B6F4A89", "versionEndExcluding": "5.35.23", "versionStartIncluding": "5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "83CE2E33-8206-4C9E-8EFF-2AAF68E61A73", "versionEndExcluding": "5.43.22", "versionStartIncluding": "5.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "5EE863B3-76C2-499F-8A9E-71C1169DC0F0", "versionEndExcluding": "5.51.22", "versionStartIncluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:netapp:fas\\/aff_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "A714C8D4-9623-43C0-8AF8-8904566AD42C", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ruggedcom_ape1808_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37FDCA69-9049-40B4-88AF-F476901022B6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ruggedcom_ape1808:-:*:*:*:*:*:*:*", "matchCriteriaId": "B89A6863-B602-4404-8D26-337FECABFFF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "75AE72A3-05C6-4564-81CC-67865D03D106", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc127e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "846EE524-BC53-4DE5-81C5-6B5EB2DD8BEA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F63C0B17-60E2-4240-92FD-4B7C7D8F2C8B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "64538703-AE66-4D4A-B4A1-C88039B9543D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc277g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1865061F-CF02-410B-B01B-2088F7104867", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*", "matchCriteriaId": "320F5752-86B3-4C08-89D0-02272753A6D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc227g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED11E5B-E60C-4359-B87C-E373DED77677", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D1E85AC-1305-4C5E-AD8B-39B2654F6057", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc327g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68215EEF-243A-4B02-BEAB-C162A3564D60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC7303D1-CC95-42C7-B843-C3B3B3336669", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc377g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62751FE8-48D7-4D7B-A7DD-4977DE539660", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDD6F034-BC50-4223-AE5D-319F04C866A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EC3A82C-1380-4B21-BB17-3760A0B6A027", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2558478-44E0-4D42-A6DC-D4262D15A92A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AD30972-8CE2-46B4-A4B8-B209F6B616AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFA7953-DC4C-489A-B5A4-B832FAF3C143", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC414E9-5DBD-4D60-B0EA-6FB48207B628", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "193BF353-5D85-4F2E-94D0-329ED823FF07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8CE311F-98F9-4E58-9E52-BAFAF87C0819", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECC5341D-9982-4F18-9C8D-2912DDB8EF9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Kernel 5.x in Insyde InsydeH2O, affecting HddPassword. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses." }, { "lang": "es", "value": "Se ha descubierto un problema en el Kernel versi\u00f3n 5.x de InsydeH2O, que afecta a HddPassword. Los servicios SMI de software que utilizan la funci\u00f3n Communicate() del EFI_SMM_COMMUNICATION_PROTOCOL no comprueban si la direcci\u00f3n del b\u00fafer es v\u00e1lida, lo que permite el uso de direcciones de SMRAM, MMIO o del n\u00facleo del SO" } ], "id": "CVE-2021-33625", "lastModified": "2024-11-21T06:09:13.220", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-03T02:15:06.930", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0004/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2022014" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0004/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2022014" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-03 02:15
Modified
2024-11-21 06:09
Severity ?
Summary
An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.09.11, 5.1 before 05.17.11, 5.2 before 05.27.11, 5.3 before 05.36.11, 5.4 before 05.44.11, and 5.5 before 05.52.11 affecting FwBlockServiceSmm. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20220222-0002/ | Third Party Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge | Vendor Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge/SA-2022022 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20220222-0002/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge/SA-2022022 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "95221F93-8BE6-47E3-BFB4-E7603C320F0D", "versionEndExcluding": "5.08.29", "versionStartIncluding": "5.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "D26CDAE4-0D04-4EB2-8A8C-CDEBDF8BA38C", "versionEndExcluding": "5.16.29", "versionStartIncluding": "5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "E0546FD8-0648-46EB-893F-411F869077E5", "versionEndExcluding": "5.26.29", "versionStartIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "89966555-5DD1-4C61-B3B2-7AF7AF7D24D9", "versionEndExcluding": "5.35.29", "versionStartIncluding": "5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "324ADC7E-AECD-4B7D-8571-5399542C2BF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "480C5657-5C05-40F5-B76A-E67119727ED8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AEB5AD1-3973-4150-BEA2-C9DE0B98222F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F63C0B17-60E2-4240-92FD-4B7C7D8F2C8B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc227g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3F52F29-0ACF-4ECC-927A-0CB27399E5D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D1E85AC-1305-4C5E-AD8B-39B2654F6057", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc277g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F203C449-2B5C-47A1-BF3D-8DCFD29F0B18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*", "matchCriteriaId": "320F5752-86B3-4C08-89D0-02272753A6D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc327g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A37FB5EC-BB64-472C-81FC-8EEF238E3C12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC7303D1-CC95-42C7-B843-C3B3B3336669", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc377g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45013BCA-3897-4D58-81FA-D8CB9D19268C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDD6F034-BC50-4223-AE5D-319F04C866A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6422BF3-01B7-443B-BD2B-80E45D7C3F5F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "696F47E6-C1CA-4A58-A91F-4B3EA92954AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F712060C-ECDB-4BC7-B9B9-468B41DE615B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D511C170-65E5-416D-B7CE-557A503F25AE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "577C19F5-82ED-46DF-91CC-A074DE99EBDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEF4592C-5DB3-45F4-B354-59701BBA0C08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87F0538B-ED6E-40C7-9C2A-4C5DC3D2935E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in Insyde InsydeH2O Kernel 5.0 before 05.09.11, 5.1 before 05.17.11, 5.2 before 05.27.11, 5.3 before 05.36.11, 5.4 before 05.44.11, and 5.5 before 05.52.11 affecting FwBlockServiceSmm. Software SMI services that use the Communicate() function of the EFI_SMM_COMMUNICATION_PROTOCOL do not check whether the address of the buffer is valid, which allows use of SMRAM, MMIO, or OS kernel addresses." }, { "lang": "es", "value": "Se ha descubierto un problema en InsydeH2O versi\u00f3n 5.x, que afecta a FwBlockServiceSmm. Los servicios SMI de software que utilizan la funci\u00f3n Communicate() del EFI_SMM_COMMUNICATION_PROTOCOL no comprueban si la direcci\u00f3n del b\u00fafer es v\u00e1lida, lo que permite el uso de direcciones SMRAM, MMIO o del n\u00facleo del SO" } ], "id": "CVE-2021-33627", "lastModified": "2024-11-21T06:09:13.607", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-03T02:15:06.983", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0002/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2022022" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2022022" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-09 19:15
Modified
2024-11-21 05:39
Severity ?
Summary
Race condition in a subsystem in the Intel(R) LMS versions before 2039.1.0.0 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:local_manageability_service:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF861CDA-5636-4772-9110-7C5175B7E622", "versionEndExcluding": "2039.1.0.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "324ADC7E-AECD-4B7D-8571-5399542C2BF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "480C5657-5C05-40F5-B76A-E67119727ED8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6422BF3-01B7-443B-BD2B-80E45D7C3F5F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "696F47E6-C1CA-4A58-A91F-4B3EA92954AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76E9B752-2DA7-4182-A52E-C13F93FB2B22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D1BCD50-6174-49A7-BEE4-BD7DD72C09AE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*", "matchCriteriaId": "55156889-E9DA-4F04-B894-339DC39CA942", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEB756BB-E343-451A-866D-40B41E059705", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18A51183-A6EF-4AC8-9A85-29FF7768AE3A", "versionEndExcluding": "25.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2A29C2D-A16F-443F-AA01-535B43F8BBBA", "versionEndExcluding": "25.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0368B9A-D5FB-4EDA-88BA-E44901F2A0BA", "versionEndExcluding": "25.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41A30BE8-ABAD-48E0-A4B1-1EBD53A31647", "versionEndExcluding": "25.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87F0538B-ED6E-40C7-9C2A-4C5DC3D2935E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in a subsystem in the Intel(R) LMS versions before 2039.1.0.0 may allow a privileged user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Una condici\u00f3n de carrera en un subsistema en las versiones anteriores a 2039.1.0.0 de Intel\u00ae LMS puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local" } ], "id": "CVE-2020-8704", "lastModified": "2024-11-21T05:39:17.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-09T19:15:09.263", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00459.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-21 14:29
Modified
2024-11-21 03:28
Severity ?
Summary
Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCE880E2-5E1F-40F5-AD2F-A266A95C51B6", "versionEndIncluding": "8.1.71.3608", "versionStartIncluding": "8.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "139DA53F-A603-490F-A4E5-44D7A0071CDC", "versionEndIncluding": "9.1.41.3024", "versionStartIncluding": "9.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFA876A3-88C1-43D8-92E0-B21E16D37736", "versionEndIncluding": "10.0.55.3000", "versionStartIncluding": "10.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "411DC559-E8A9-4BC4-96C6-EA753E54543E", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "559DF7F6-F649-4C57-893A-6775F07C31A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.6:*:*:*:*:*:*:*", "matchCriteriaId": "2380C5D8-8A58-4279-A3D9-7234C7B1D668", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.7:*:*:*:*:*:*:*", "matchCriteriaId": "39EB2D65-90F2-4866-A886-F64DB9C7D2FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.10:*:*:*:*:*:*:*", "matchCriteriaId": "69EF0C50-F104-47CE-89E7-BC37FE1A5717", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.20:*:*:*:*:*:*:*", "matchCriteriaId": "3D764C7C-2C49-4149-9586-5D0140CE00FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F41472A-BC3D-4226-88AC-975E523C3678", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-premium_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AEFB41-300D-4541-90EC-6F736A06A404", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-premium:-:*:*:*:*:*:*:*", "matchCriteriaId": "54563F87-598C-4301-95C5-A582A78E3D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-deluxe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF442E72-096E-40C0-9258-3E2474545E2C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-deluxe:-:*:*:*:*:*:*:*", "matchCriteriaId": "54781F85-88B1-488F-A33F-442947CDA125", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1EEE05D-D9C8-44C0-A8BD-D6A262A79CF0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "9606205C-88D0-44BB-8052-1E78C512DEB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDE25BF7-37DE-4F90-81FD-D95A2A3031BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "95C71F90-C6E8-49D8-AC7E-1BC2FF49BFA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-ar_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37A4CC55-E868-4174-8FC1-23FBF75A973F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-ar:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C9CE58F-3A49-41B8-B9EC-F901AB83D861", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "277B4C76-D04F-467B-8367-E51F74E21ABE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "82DC9901-B4D7-4FD6-86BB-B75FF30CB11A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6701855F-2D7F-4559-A8D1-CF8A8C999B91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "E66B1596-8BAA-4805-8D49-9C42E270B219", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB1F7656-9A1F-409C-BA46-BD1B979C25F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D7EB86B-7BC7-4D34-9EDE-04564FEFEDAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2357072-5ED5-4DC9-BF2A-AE6F85C6C240", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCC3417D-44A9-489F-A440-8D3E75DD3586", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170m-plus\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "01833F6B-F38D-439A-B84A-047DBC75F71F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170m-plus\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "89756DDE-8EA9-4135-BBA8-0707FE3D81B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-p_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1249DEA2-CEF8-4009-B6BF-E0DCA5032B75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-p_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B7D4616-0DCA-4168-8CF4-7055AA922E2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170m-e_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57BB2B24-1B03-46DE-B4F9-CCDDD83FA28C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170m-e_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F309D3DC-E2C2-406C-B742-71CAD9E4A568", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:sabertooth_z170_mark_1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D42A2157-8724-4CF2-88F0-048231320354", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:sabertooth_z170_mark_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "283B693A-D720-411C-96C9-91E356A97FD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:sabertooth_z170_s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7868F0B3-ED86-4C00-A227-CFD8A14A0790", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:sabertooth_z170_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "45195F20-5E26-426A-A272-5B6342BD06C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_extreme_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77678DA-7926-4688-BFC6-9C989985C633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_extreme:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C33821F-3755-4301-B808-806F918FF06F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_ranger_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE0AF7AF-0416-4E40-9F18-74B89E0E0F47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_ranger:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BD49CDD-10C4-4795-BCEF-132FDB6A25CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_formula_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1763A28F-2ED5-4309-9C02-0587DD2435CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_formula:-:*:*:*:*:*:*:*", "matchCriteriaId": "334D6552-C4E3-4F13-ACD1-3BE6312E9FEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_hero_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABF49D87-4566-404D-908D-3C5A02B0BE7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_hero:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFCE5FB6-2F8D-4707-BE1E-26DE66C7740A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_hero_alpha_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13578BDF-A38D-4357-AD35-41BA988E286B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_hero_alpha:-:*:*:*:*:*:*:*", "matchCriteriaId": "F716322D-6778-45FD-A4F0-A773A28EA3F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_gene_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4D318FB-16E1-4B5D-817A-2A13DF88A1D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_gene:-:*:*:*:*:*:*:*", "matchCriteriaId": "E968C4AB-61B0-435C-BAC5-A70EC78EAD5F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_impact_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "054E1398-AE98-46AB-B7A6-703F342CC847", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_impact:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C5667A1-AFB2-4ABF-B9C8-CB24EBFF16C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170i_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BC1CDA2-B140-45FE-8FE5-2FAC5B3907E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170i_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E8DCBFE-9482-40F6-9C8F-E4A472767FED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A02FA657-FC01-4795-8246-B777A7A5BCAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "23E5CBA9-E946-4F22-A0E9-40A63380E260", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F814D5CE-2F35-4631-BC6C-857CBBD9DC72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170_pro_gaming\\/aura:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E3FF12D-3EA0-4738-9B36-ED5461C9D0C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3BE8D64-A47B-4412-AF8A-354D01DB719C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "F273293C-6EDA-485E-AA38-A4FE41822171", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77C23914-2AB4-4D6F-A438-F1762F235D92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150_pro_gaming\\/aura:-:*:*:*:*:*:*:*", "matchCriteriaId": "22CB8991-762A-46B5-8759-AF453E21FD95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150i_pro_gaming\\/wifi\\/aura_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3ED630E-C695-47DD-AABA-39603766CE2A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150i_pro_gaming\\/wifi\\/aura:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B17C450-C8E8-4255-8E23-4ABBC8664366", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150i_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7800E86-9FAF-4D42-8029-97A22AF87E20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150i_pro_gaming\\/aura:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF81798D-F241-499D-84BC-AE647D7DA06A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "552BBFAA-A268-4DF9-AC1B-9A99FD5BAA83", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBBDF56E-375F-439E-A1A7-1D94523C6DF7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A06F70FB-E259-4957-9D86-88805F8C0753", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "91597904-8647-4109-864D-5EC577A22C55", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-a_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E32C912D-CF86-4A1B-B440-E61B3B24886C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-a_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0232EA20-A6BB-4CC9-88FE-F91BE7EFFCFD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-c_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3B8A7AC-953B-4CEE-8DF5-6B5787918CC4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-c_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B266B9C5-DB7D-41B4-BD43-F50A45B8688C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "109745AA-5210-49EE-93E2-2660FE605273", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "3990C807-1EA1-42FD-9C38-7B28E99B9630", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAFDA852-209E-49BB-9793-F2E26FAE785F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "60AB4DAC-E806-4772-96C8-F7C68930AA24", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED6011C6-C8CC-426A-BBB3-AA2698A191DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE6C34D6-D42F-4FA3-A9A3-985F6F49704A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "638CA839-0DB1-4F26-AC1F-3B65BB2DA0C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "75E4F53F-65C2-4254-AB16-51EB04CF10DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-f_plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F0F3C11-8700-4472-ADD5-462EAC571A5D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-f_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "6381EE22-DFF3-4197-96C6-1B448D6AC9C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2BC083C-2DD2-40C5-9B5F-6CB524FD71DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DC8BB48-0826-45F6-B5E5-06FB66995E69", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-v_plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "82068A08-B5D9-4A79-B81E-2249543175D8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-v_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "723BF580-21B0-4FD4-8F43-F609AFD53B0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b150m-v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C81507B7-3C02-4AA4-B9E3-4F1DF9E9465A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b150m-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "A94BE221-3E91-492F-9BCB-2538B6812400", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b150m-v3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72FD9041-A1BF-4483-B9C2-70F8AB00C162", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b150m-v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A763DB3-F4AB-4696-B49B-9EC929E4B17A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b150m-v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30B7BF90-6D37-4211-9AC5-27F82D6DAE46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b150m-v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D3A85B3-0576-4D31-A088-EBBEF429B2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b150-v7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8D7220B-8CF7-459E-9C93-FE2ED3AACC5B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b150-v7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D65B38A3-43EE-4EF8-AC46-8725EB3B4E69", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23C4E73F-2B93-4CAE-ABDB-AF1C6C3E1763", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "42F37D51-6D2D-4325-BB0D-3FE2D5D1F2C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-a\\/m.2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBF463BA-68F0-46C5-A948-EA233A7B493E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-a\\/m.2:-:*:*:*:*:*:*:*", "matchCriteriaId": "10021E63-ED8B-4C5D-9559-93DA26469611", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B91F6BEA-C713-4394-A894-AC40053E4FD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "3202BBE4-8BC9-4266-89E1-02EC58034284", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-c\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "09432C60-8EC9-4FF9-9633-FF8779A5F9B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-c\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "49991ED2-1D79-4148-8F05-DE224ADC5181", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:pio-b150m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30643353-C9AC-494F-B34D-4226042910CF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:pio-b150m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B96870-A832-46FF-AF3F-169C486464B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:trooper_b150_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "820B589F-9D3E-4D9C-8112-C11E28F9271E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:trooper_b150_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8645FCEC-625F-4540-843D-CB56FBFABDBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-plus_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBF89B32-1A7C-4BDA-9A45-1FFC1F38DE29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-plus_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EE36CBA-3C04-463E-A21A-1F489D755896", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150_pro_gaming_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6625FD9F-41FA-450E-9CD0-AC8C237C4D4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150_pro_gaming_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "21888815-D392-4E6D-A831-F2C170E4BE8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-k_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27B7FD9B-4FD1-4B60-8394-F51A8446D901", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-k_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "72749164-D3A3-4F10-80FC-331FB6705899", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150-pro_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABC24FA1-BB23-4FB3-A35B-6BD05BA45EC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150-pro_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CFFAE60-468F-4861-AED3-76EAF9676E19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-h110m-v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8ADE34C-4A5E-49CA-83CB-119703C5C2B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-h110m-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DFC293D-73DA-4048-A89D-92092D7BE42E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-h110m-v3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5847BEF-CD8B-4B2C-A015-847CE9611EB0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-h110m-v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1D362C-359D-455E-BBEF-9B77838419B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110i-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16B21217-FC88-4AA0-A4AA-49E98A30122C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110i-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "E18DCD2A-3F80-461A-A04D-7BF084438E07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-a\\/dp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2A70E8F-6058-4776-85D7-7FBA0D6B33B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-a\\/dp:-:*:*:*:*:*:*:*", "matchCriteriaId": "14544DF1-2E6E-4A8B-9B86-2E10B5FE4282", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9229F19B-E8A3-44A0-862C-BE7DE7264018", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "49098E76-F811-451A-8D7F-1B40491A2278", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DE58681-7681-4729-A9AC-FB1317FE1168", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "59B400E0-1526-4C46-A60D-84D468B1911E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c\\/hdmi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1204092-3B5B-4243-A0F6-B16C5C661F77", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c\\/hdmi:-:*:*:*:*:*:*:*", "matchCriteriaId": "E71E3A13-644B-491C-97AA-688DA9214561", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c\\/ps_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F8AD0F1-8E0E-46C2-9F32-F34F16CFE491", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c\\/ps:-:*:*:*:*:*:*:*", "matchCriteriaId": "38472135-237B-4EE1-8D66-D94B6F3FCFD4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "33F4CBF7-CBA2-438A-A997-ACDB83322F2C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c2:-:*:*:*:*:*:*:*", "matchCriteriaId": "767EE0C3-16EC-4D40-A86D-B14586EF9AD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c2\\/tf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B122984-8F1E-4CBE-A127-2C7AA5BE1178", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c2\\/tf:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE17F92F-990E-4080-BEE0-9549FBDAAE0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-cs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13D9955B-57E0-404B-B677-0F0CBAB17606", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-cs:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1D30CDF-60B0-40B6-8F3E-4C68AD2F507C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-cs_x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "61CFCE10-117B-4596-9EC8-0FD763D83445", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-cs_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "801129A7-C8A2-4D90-9C54-13FAC9B96762", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-cs\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E870D6C-4C0F-4C70-A432-FD02CE45AEA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-cs\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA55C126-A4D3-48D5-A277-772923EAA7DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-d\\/exper\\/si_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "927D8CBD-EF57-48E2-A80C-E27907E72CED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-d\\/exper\\/si:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D6DF281-4E33-4DE5-B5F5-9FEA95885ADF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-k_x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62A74624-952E-4342-BABF-9E59DE71A633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-k_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1CC4DAA-79B1-4747-BE1E-69C194E6BCDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-ks_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F8B2CA4-B41E-4900-8F85-80A472670868", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-ks:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE12AD23-6AC5-4F08-B1B1-E59F728E9668", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-ks_r1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98B532EC-7D68-4F05-9C84-EB074A85A764", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-ks_r1:-:*:*:*:*:*:*:*", "matchCriteriaId": "B97E501F-0C7F-4BA0-B04C-C8A623F7156F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-p\\/dvi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "75E4DEB7-3F0F-4C62-991B-5A75B27696AA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-p\\/dvi:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9810952-332C-4849-BB12-1253AF76E1BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-ts_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3779667-7513-44D8-B2E5-1925594AD3E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "C795E996-2996-4731-A78E-FFA9585DCD31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2058E0D4-EAEB-4CD1-AD89-BC69858B734A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "558AF38E-674A-49B5-A023-2043C89714E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110s1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5E83F44-B421-4B24-BE8D-561D57883E54", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110s1:-:*:*:*:*:*:*:*", "matchCriteriaId": "38AAA664-8BC3-413F-BB92-8BB6B3690EDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110s2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42CB2BDF-E9BF-4049-8D44-FD660AC60AAF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110s2:-:*:*:*:*:*:*:*", "matchCriteriaId": "81F53F8B-379A-416E-A44D-38ED9499A120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C47313A-2FBA-49AD-AD68-5F817411D994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0232650-B917-4734-B322-D12ADB06B435", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110t-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48BC9BDF-0562-44FE-B2A5-F8B26B98D94D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110t-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "70A3F2A5-56BF-41E8-959B-0AFFCC130361", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-a\\/m.2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B4A88EE-9112-40B0-8A11-4841550B5C3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-a\\/m.2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A4787E-F9CA-45F2-B43A-3C9BAD580204", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D757A98E-209C-4391-9B7B-2CD60D5A4FB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "A12979DE-AEC4-4D51-8E0A-E714C85F6D7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FC08CFA-0254-41A0-8599-7F1033782B2A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6367721C-A009-45AC-B272-8290A8331284", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-e\\/m.2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9617970B-9C4B-47D3-982D-8200BC52D0E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-e\\/m.2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E1915CF-2419-4C1B-80B9-8D29D379E1FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "179BC9DB-AA35-4A54-8EB3-1DB295727997", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1B8722E-E334-47F3-A3BE-B9AB798A5305", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E65AAA6-B29F-4859-9A99-591F6BD1371C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "D182935F-8629-4F9D-925D-A166007B446B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B54A67BA-C862-4BA0-94D2-13362FF2F26B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "975830EE-92F4-4614-9AE8-E9D5DBADE414", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:trooper_h110_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D12B0228-80F1-466D-86F2-57F7E7BA4095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:trooper_h110_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B75FEA3-D643-4348-9FA8-07D3127C8D88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C6C8818-47EC-47B5-980F-5109C56C5C1F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "85E4C230-C8B3-496E-9012-5CF032D420E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-r_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7952968-C3A8-40CA-8000-74B23C112AB0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C05633B-3CD2-429B-9239-DB6F189C8C79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h110m2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "87D53057-61DA-498B-B76D-6FB0FD50BF61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h110m2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E222A3E-2E1E-4B46-A6DC-E91831CEA856", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h110m2\\/fpt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C7A40AA-4A94-4DB5-ACE5-048E7E1C998D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h110m2\\/fpt:-:*:*:*:*:*:*:*", "matchCriteriaId": "D149B106-67CF-49A1-AE7D-CE3F3BC3F266", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h110m-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FC93A9D-E01B-40CD-95C8-A82085358E16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h110m-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E3D7210-68E7-4D3D-B65A-F7C200C07A95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-k_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22F82466-28C5-4495-876C-4697AC0834E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-k_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "99B2BCE6-8BA3-4A11-B030-F571346AB3B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-a_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "137F1817-ED86-4371-8553-70D415802E23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-a_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB077E96-C7D6-4314-92B3-52ED4B6C10BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF58ED92-6E4B-4130-BAB0-81DA31518E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "B037D858-125F-4762-8DA2-09BA7807898D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170i-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BC8AEFC-6BF0-497B-8BAF-7DA3EFB8FBD2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170i-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "1297573C-0F72-477A-B85C-0ED65412E893", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEFFDE24-215A-43B8-9B3F-D73B52ECFD15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "BED2A131-07A0-4E8B-8015-9E55DC1C6BF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "513A1D93-DE0D-4455-95C8-FC7AF72677D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "59B4013A-5F8E-47AD-80D5-526A68281515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170-pro\\/usb_3.1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "982E919B-4936-4BE3-955C-82FFEE504807", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170-pro\\/usb_3.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F7415EB-47BE-4F88-8310-9BB1CF0EF299", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170m-plus\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04DD6014-6CF9-45AC-8A2E-0AD946B811C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170m-plus\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FE848FF-BB23-4D4F-AFFF-45EC87315A67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170-plus_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "756F0FED-9E9B-4540-A425-F7534C4BE070", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170-plus_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "918AB13E-43F3-47F2-98FA-56FE89CFB1FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170m-e_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C797373-3D39-45AC-BF51-4D0FF6471D83", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170m-e_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B7EC3FF-81AF-40F4-98D0-4A1DFB937222", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b250-v7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3D72C50-E023-44FE-B44A-EBB96883F234", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b250-v7:-:*:*:*:*:*:*:*", "matchCriteriaId": "895AA24B-1419-4E66-8BE1-7D3439496FCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250_mining_expert_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BF02AB1-1C94-48A1-BCBD-A50F049DCA97", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250_mining_expert:-:*:*:*:*:*:*:*", "matchCriteriaId": "79A2E62F-94DC-4F76-BFB5-96B45E8E3364", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BFF834F-54FD-4427-86BC-59CACB5720EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFFE0FB6-3E57-420E-BAFD-89C67EC8798C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FC5BA59-2868-4066-B557-A337FCBEBAEE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D54BCF0-396D-4AE9-BF98-408A30C23DFA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "712F55B3-C78D-4BB1-AC61-C6789997F830", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EE19287-8C71-4161-94C5-B31A2CA907FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-j_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AD1F89C-B419-43B7-8CEC-BBA00C0A33B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-j:-:*:*:*:*:*:*:*", "matchCriteriaId": "E868B563-75A7-4E94-875F-BC0EA7AA228A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5DA489C-E6A4-4F30-9CBF-D532D4DC4934", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E0A4463-96F7-4516-B91C-DFAFA98358D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42625B8C-5163-43B9-9DC8-E8AB1E1A6CF3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "6721CA1E-EEAC-4CF0-BB0C-4AE44049CDC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB59C47E-47B5-41C4-A142-E818589D86A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "4512943B-7794-454B-A0AD-D1F7C23D00BB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FB07DCB-5D90-4BDA-8277-99211DBB3BF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A4EC730-8E50-4274-99F8-B6A57C843546", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_b250i_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C4A7BB6-6E6D-48BD-9539-E01C801E2CF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_b250i_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "89865346-0EC6-4C1C-92CC-231ECE6AF73F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_b250g_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F70AAD95-7460-49EE-BA18-4A9826658CDA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_b250g_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C326D51-0C5D-48CE-AF7B-73DF1BD08F67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_b250h_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "900ECAD1-0290-490E-BB94-82667C13B829", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_b250h_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "0760F2E1-5A01-40FC-9A2A-05C769D05986", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_b250f_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "20419867-19A3-41D0-AD4E-866B47035EF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_b250f_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "97D572B8-0F2C-48A9-B397-DA1FE92844B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250m-c_pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E49CE82-A630-4BBA-AE5B-35E1D7FF299B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250m-c_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBE24086-8BC1-4B7C-BB2A-D4623A2841C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250m-f_plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9941B2B-CE46-4669-947D-2BA09DEF6B1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250m-f_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE77E05B-54E7-4691-AF93-ADC24AE07D9F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250-mr_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34DA5C31-71E8-4CEF-AEFD-0BD468E98870", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250-mr:-:*:*:*:*:*:*:*", "matchCriteriaId": "118522B5-3E87-4D27-9FC3-13F3AE4651BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250-s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6C02BD4-E46B-467A-8441-633933EE57E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A270BEB2-4073-457B-9E7A-041F25B00A70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b250m-v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4494A410-658A-4DC7-85C6-3792D4A4636D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b250m-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D5BAFA0-2A5C-47A4-BA7F-B5C6A0436A5F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b250m-v3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6928685-947A-444F-B242-55B30F2BD495", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b250m-v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0170DE0A-DF4E-4881-9C66-9BF005897F12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b250m-v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F713C93B-03CC-4688-8590-81C84C52D10F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b250m-v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5135C-B68A-4D60-89A7-AA3FF6DC8508", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:pio-b250i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F194921-25DA-40AD-AC77-A5C886E653DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:pio-b250i:-:*:*:*:*:*:*:*", "matchCriteriaId": "16DB8D6C-64B9-4F5C-AFBB-EF32A2EF1949", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B3E1D43-964F-4AC3-B0AA-E7D30F2135B7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E50A677-E925-4E60-8F81-FB8E4A8CCBF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-plus\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD09D5B3-575A-4941-99DF-C1CCB324EF0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-plus\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "70A7A86F-A63B-4F2C-AE2C-7F321CA7E017", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h270-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "894292B4-B683-4AE1-ACA0-07E14A7CAB04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h270-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B312D0-771C-4C55-92E7-E19A82201B94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h270-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A889C5B-AA38-4BEC-B9D9-C20BCD51ED34", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h270-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E8466D0-3102-4301-8F34-69FDF5E2F760", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_h270i_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C297BE7C-ED2C-4E7C-888D-78C9246D3F4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_h270i_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "D92BB8F1-1C5D-4DDE-8A35-CFC96EEE2A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_h270f_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "76DB8A91-69F2-4028-AC04-B0FFCCFDD882", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_h270f_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "C85379BD-1976-43A2-87D0-B690B4A9440F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h270m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "369BF713-2229-493B-902C-D23F3DFE504A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h270m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DB699E7-4212-46C0-BBA0-A3A08AD6C225", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_extreme_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C399C14-6B6D-4CFC-AB98-94FCA8B982EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_extreme:-:*:*:*:*:*:*:*", "matchCriteriaId": "A32D2A1B-DA72-4FF2-A1FD-804B1A3671B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_formula_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "072786FB-D929-48A9-BBB7-7EC3899DC9A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_formula:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCA041A0-8103-4742-BA97-FD28DD2EDEE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_code_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "86C5F146-C7FD-4479-8E11-7443DCEA38ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_code:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA3A7B7-27CF-467A-B387-1B5D6120C0B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_apex_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBCB7188-8D72-4619-9779-73B6586A18E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_apex:-:*:*:*:*:*:*:*", "matchCriteriaId": "92B48FFA-7FFE-44AB-9528-0681F631C1FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_hero_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D402D3D7-319F-45D7-A5A2-8D1972D92F38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_hero:-:*:*:*:*:*:*:*", "matchCriteriaId": "49D75118-242F-454C-97B6-9C50330E82BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "20F905D6-74DD-4547-82CF-AB43E3DD5AA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "D84124C1-41B9-4963-9E2E-F84E356D2EC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270-ar_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "60D56403-47C2-4321-BEB9-E08D392AE2CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270-ar:-:*:*:*:*:*:*:*", "matchCriteriaId": "A522350E-2FCE-4DFA-A660-7FA0CD1462C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270e_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED821805-43F4-4594-8B34-9369A4A51919", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270e_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E59CD1D-24F8-40DD-BC34-1798B9BFD142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270f_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B55966-2BE6-43B7-B3B1-5AC2E476029D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270f_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "F80FE467-6745-462E-9602-D99EEFE4496F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270g_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1D51FA0-90A9-479D-9F0A-D0A8BFC5C6E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270g_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5D0B584-4C98-4C58-B098-153A07FA7B7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270h_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77D33D60-DE04-4189-A8E6-B453F566970A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270h_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "122BD789-E195-48C4-8043-E7C911809AF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_z270_mark_1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F5C6507-2A00-4BEE-A2B0-9D0099DF4EC6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_z270_mark_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "52653418-2D8C-464A-806A-0E5BB7C70C58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_z270_mark_2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4AB056A-3C43-4C1A-8ECB-C8ACF645FFB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_z270_mark_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "098C6278-2B15-4D35-BDAD-6EABB5DE4A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270h_gaming\\/k1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE33B2CC-C64B-4983-928A-BE8332458922", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270h_gaming\\/k1:-:*:*:*:*:*:*:*", "matchCriteriaId": "57DD3BFB-3AC5-43E8-AF3D-AA9DDC0E0B68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63602AEB-A984-4556-B7B4-906BF0B1C4CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "69CACC60-EF0C-417B-8927-CBFDB90DE31D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D434C2FA-C27E-477F-A82E-4DB6B29F3162", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CBCF0D7-EACE-4368-AE89-F4B70BD583F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270i_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB7FA773-033A-4502-A675-25AA640A9C61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270i_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CD3456D-04D8-4269-9971-D9245185FB63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4AE1333-6F84-4D66-B5D0-C4FE8A3360A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "801BA881-11C2-4042-87A1-6FDC643F2F39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270m-plus\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7710F47C-C723-4F97-8A17-1BA8F1005255", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270m-plus\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "93B6459E-CE0C-4344-8D63-C0116AB32796", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B69866D-4F3C-42B3-9B20-62137551CE9C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "B346C94B-7A59-47A1-B2F6-A888968B7FE3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170m-cm-b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F09095A-1795-4FDB-A1B5-5FC584E1191F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170m-cm-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "88504A31-F003-4344-BD7E-A1D5F0970FB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170s1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D61D6C5-4FB2-410D-A74D-1792054C6C04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170s1:-:*:*:*:*:*:*:*", "matchCriteriaId": "5650BA0D-6066-42A2-8062-3FF81009E10B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A3B9CE8-C405-4C88-A6B1-5D5A3414096D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF01DCA7-9A31-4B2F-A34A-FA45E97522F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170t_v2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77F596F0-6418-4D20-86C5-B48B027EC265", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170t_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F40FF26-207F-41C7-8E82-7AD6681AE0DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170m2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E33941-7E24-4FC8-941C-CC62B6B58822", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170m2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6B670DE-DB47-418B-A2C4-E68C49C2FAAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170m2\\/cdm\\/si_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69369624-8D90-4A2A-8B85-8884AC5CBD28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170m2\\/cdm\\/si:-:*:*:*:*:*:*:*", "matchCriteriaId": "A851E8E1-B1F0-4083-AFA8-3F59779F0206", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_q270m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD61F9CE-68E5-481C-9711-B40343FF90CE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_q270m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "56E41F36-3579-4AE4-8E7E-20D81962EA79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q270m-cm-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "233065C5-57E6-40E5-8A52-AE6D6F7196AA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q270m-cm-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A571EB0-25AB-4450-8847-042749CE5F7D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q270-s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8030ED2-0286-420A-B514-AC986C2700BF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q270-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4E56764-2A59-4B73-89A1-9D391FE33D5A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_j3355i-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0520B4BF-4363-4747-86A9-5D481927CF4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_j3355i-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "94719387-576F-4949-AA4D-6C8453085EBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_x_hero_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F854F8A-CD36-4721-A1D2-5E6EC5D9FF45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_x_hero:-:*:*:*:*:*:*:*", "matchCriteriaId": "9820DF03-00B5-4363-AAE7-9D8F2FCBA91B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_x_formula_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA24153A-AE9B-4F76-9DFF-E00AB46744BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_x_formula:-:*:*:*:*:*:*:*", "matchCriteriaId": "86DEDFC2-7A73-40F6-BDCB-8E135BFC4EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_x_code_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53223DBA-DAA1-4942-92D1-68B7647D07AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_x_code:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E633481-0AD2-4291-8653-FEB3DA5DA279", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_x_apex_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "272713A3-B88D-405B-AF30-FC6E90F2E3DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_x_apex:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCE784AA-CC5A-4995-92AC-28073BABD832", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z370-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8260D7C-031B-489F-A7B9-1DEFC846BCD5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z370-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A56C38-B2C6-4F19-806A-9346190BD7AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z370-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1536F2E-3181-4897-8ABD-AB2B939DF992", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z370-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD78127D-4BCD-4733-ABC1-D8558BE07C3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_z370-pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1419951-3645-4CBF-8EE0-209DC1727E92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_z370-pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "E78CF821-AFD7-4E76-BB94-A45495ABEC37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_z370-plus_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "060358B9-3630-421B-9366-F726D19C15D3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_z370-plus_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8678C89-35A9-4256-AF4A-CC3A11BDB540", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-g_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1579A407-454F-4838-8850-8D4057507C8A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-g_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A138826-DC79-4620-9142-2B7030DFCEAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-e_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F050E14C-429C-421D-A01C-CC8E1DB40769", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-e_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "087C89AA-9876-4754-B2B1-CAE4F86D1375", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-f_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F62BFA52-B89C-410E-9FC6-B6F39825515A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-f_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B49B4BB-6D24-43A1-81DF-E786DFA600F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-h_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48EBFFF2-0AF5-43F7-AAC2-89F4625F9185", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-h_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "271701A1-CFD4-4781-9F81-3255D90F8EE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-i_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6681601-99E9-492B-86BF-9C3BE23D1E9C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-i_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA8A2D55-C766-4E90-BB0E-2D912F17C768", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A15E9E54-0414-4C67-9DCD-181FCF2EE838", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6127C45-E91E-46B7-A806-FC0068575DB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4487A96-6AF1-4F41-9FF7-ED711FB89FA4", "versionEndExcluding": "18.01.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADAD919-32C1-49D2-A419-C9A803DB6250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E79A718-EEED-4C35-8B3A-8BDEFBC55282", "versionEndExcluding": "22.01.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC70C5D2-748E-4D6C-ADC9-ED098541C8F1", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F55B7-DE3D-4D74-A7E7-9BCB8F7B114A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A87041DE-EA8D-4DC1-BD7C-03C42C6EE7FA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*", "matchCriteriaId": "46CC8AFE-ED6C-4A50-AC80-D2309E03FAE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDFE3D1F-F8B4-4682-BBCC-2CBD3CFFFBD4", "versionEndExcluding": "21.01.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "631AF2A2-F925-45CB-82DE-39053016F5B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*", "matchCriteriaId": "754A6744-5194-4A99-BD3B-944A8707C80F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477d_pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71E7F6E0-9D8F-40CF-BC30-43505FE0CC16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477d_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAA84FF5-0C2A-48DE-94A5-ACB5B01E03EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90723D2B-49B7-4F70-9DD1-DE9F602E8DA2", "versionEndExcluding": "21.01.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E364B9-1FC7-418A-860D-DD0E73DD930E", "versionEndExcluding": "7.1.91.3272", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547d:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DCF5972-C72D-4DE9-8B73-3C497D54596B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD389CE-AA26-445D-8D2B-27D3D06C3B68", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DD4A97-1648-4C7F-A5A0-6899BD13A617", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBC1791E-E3B5-4B75-B816-9EE20F44D9D6", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD1A57A9-F6E5-4672-BD22-09EF5522CA10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "042B60E7-0614-4EB3-8B47-07DEE5B5E274", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E9D150F-BCE4-4FB6-BBDE-4A55F12DBC37", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E752006C-6D94-4B14-B3A5-C9BB94141BDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9EE1C2A-FCDB-42AF-8B3E-A805F12A74C9", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F0583DE-EBB9-41C7-92C9-4E4E259F28B8", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C5DA136-7541-44E4-B8DF-065CEE065A99", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FFD2D72-5464-4B86-BACB-61F55A081C3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C37BC27-C5B9-4740-BDFE-9439FB248CE6", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D87239-40C1-4038-B734-D77AC4DDD571", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5C3B3FD-7CF7-4172-87EC-11C129D5508A", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*", "matchCriteriaId": "687E1212-EC5A-47BA-ACAB-74F6C98B7C34", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4EAE137-9336-43D6-AF8A-9161F236BD14", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F37D88-E086-4060-8420-BD0F8D8FF580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F29FED-7876-4801-B0B1-BC06A30B1310", "versionEndExcluding": "23.01.03", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_p320-4s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AD2CE43-B3B3-480B-A607-BB5817B43256", "versionEndExcluding": "17.02.06.83.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_p320-4s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A49883F4-8360-4895-8E9E-B274A35BDE57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinumerik_pcu50.5-c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF57DC28-0EF6-4610-8B3C-587B79740D25", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinumerik_pcu50.5-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E921D034-33C4-4526-8F94-98D580922409", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinumerik_pcu50.5-p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "578D9CB9-6831-41C5-99C3-E1940562F118", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinumerik_pcu50.5-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CE0F71E-62D3-463E-9CE2-E088D6D3F05A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allows attacker with remote Admin access to the system to execute arbitrary code with AMT execution privilege." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer en el kernel en Active Management Technology (AMT) en Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 permite que un atacante con acceso local al sistema ejecute c\u00f3digo arbitrario con el privilegio de ejecuci\u00f3n AMT." } ], "id": "CVE-2017-5712", "lastModified": "2024-11-21T03:28:16.610", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.2, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-21T14:29:00.540", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101920" }, { "source": "secure@intel.com", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039852" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "source": "secure@intel.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "source": "secure@intel.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101920" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039852" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-16 16:15
Modified
2024-11-21 05:21
Severity ?
Summary
In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the AhciBusDxe, IdeBusDxe, NvmExpressDxe, SdHostDriverDxe, and SdMmcDeviceDxe drivers are 05.16.25, 05.26.25, 05.35.25, 05.43.25, and 05.51.25 (for Kernel 5.1 through 5.5).
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20220216-0005/ | Third Party Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge/SA-2021001 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20220216-0005/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge/SA-2021001 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "7A8D4515-2E1D-4C69-B561-6F42B54FFD74", "versionEndExcluding": "5.34.44", "versionStartIncluding": "5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "38BBAD45-A06D-41D6-A1CC-5AD560E9DCB8", "versionEndExcluding": "5.25.44", "versionStartIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "816E66FC-0597-4442-9257-69B97D27D815", "versionEndExcluding": "5.16.25", "versionStartIncluding": "5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "A889306B-C22C-4F29-BDBC-08B86252A584", "versionEndExcluding": "5.42.44", "versionStartIncluding": "5.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "C47A7464-4682-474D-B094-CB6F2BD3B6B4", "versionEndExcluding": "5.35.25", "versionStartIncluding": "5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "0AECE476-8649-4928-9702-9E9737E1A764", "versionEndExcluding": "5.26.25", "versionStartIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "5C8173E6-4FED-481D-BF5E-3CABDF13CA61", "versionEndExcluding": "5.43.25", "versionStartIncluding": "5.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:ruggedcom_apr1808_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E08DFAD2-130C-4B75-B7EF-602C4B3324F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:ruggedcom_apr1808:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD56E8B2-232B-4E1C-BB3F-41B0C1E31D7B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "75AE72A3-05C6-4564-81CC-67865D03D106", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ECC5341D-9982-4F18-9C8D-2912DDB8EF9A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc127e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "846EE524-BC53-4DE5-81C5-6B5EB2DD8BEA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F63C0B17-60E2-4240-92FD-4B7C7D8F2C8B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc227g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ED11E5B-E60C-4359-B87C-E373DED77677", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D1E85AC-1305-4C5E-AD8B-39B2654F6057", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc277g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1865061F-CF02-410B-B01B-2088F7104867", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*", "matchCriteriaId": "320F5752-86B3-4C08-89D0-02272753A6D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc327g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "68215EEF-243A-4B02-BEAB-C162A3564D60", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC7303D1-CC95-42C7-B843-C3B3B3336669", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc377g_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62751FE8-48D7-4D7B-A7DD-4977DE539660", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDD6F034-BC50-4223-AE5D-319F04C866A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4EC3A82C-1380-4B21-BB17-3760A0B6A027", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2558478-44E0-4D42-A6DC-D4262D15A92A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AD30972-8CE2-46B4-A4B8-B209F6B616AC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFFA7953-DC4C-489A-B5A4-B832FAF3C143", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0AC414E9-5DBD-4D60-B0EA-6FB48207B628", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "193BF353-5D85-4F2E-94D0-329ED823FF07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8CE311F-98F9-4E58-9E52-BAFAF87C0819", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "64538703-AE66-4D4A-B4A1-C88039B9543D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "In the kernel in Insyde InsydeH2O 5.x, certain SMM drivers did not correctly validate the CommBuffer and CommBufferSize parameters, allowing callers to corrupt either the firmware or the OS memory. The fixed versions for this issue in the AhciBusDxe, IdeBusDxe, NvmExpressDxe, SdHostDriverDxe, and SdMmcDeviceDxe drivers are 05.16.25, 05.26.25, 05.35.25, 05.43.25, and 05.51.25 (for Kernel 5.1 through 5.5)." }, { "lang": "es", "value": "En el kernel de Insyde InsydeH2O 5.x, algunos controladores SMM no validaban correctamente los par\u00e1metros CommBuffer y CommBufferSize, lo que permit\u00eda a los llamantes corromper el firmware o la memoria del sistema operativo. Las versiones corregidas para este problema en los controladores AhciBusDxe, IdeBusDxe, NvmExpressDxe, SdHostDriverDxe y SdMcDeviceDxe son 05.16.25, 05.26.25, 05.35.25, 05.43.25 y 05.51.25 (para los n\u00facleos 5.1 a 5.5)" } ], "id": "CVE-2020-27339", "lastModified": "2024-11-21T05:21:01.897", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-16T16:15:07.897", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220216-0005/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2021001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220216-0005/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2021001" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-20" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-11-21 14:29
Modified
2024-11-21 03:28
Severity ?
Summary
Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BCE880E2-5E1F-40F5-AD2F-A266A95C51B6", "versionEndIncluding": "8.1.71.3608", "versionStartIncluding": "8.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "139DA53F-A603-490F-A4E5-44D7A0071CDC", "versionEndIncluding": "9.1.41.3024", "versionStartIncluding": "9.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BFA876A3-88C1-43D8-92E0-B21E16D37736", "versionEndIncluding": "10.0.55.3000", "versionStartIncluding": "10.0.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.0:*:*:*:*:*:*:*", "matchCriteriaId": "411DC559-E8A9-4BC4-96C6-EA753E54543E", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.5:*:*:*:*:*:*:*", "matchCriteriaId": "559DF7F6-F649-4C57-893A-6775F07C31A5", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.6:*:*:*:*:*:*:*", "matchCriteriaId": "2380C5D8-8A58-4279-A3D9-7234C7B1D668", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.7:*:*:*:*:*:*:*", "matchCriteriaId": "39EB2D65-90F2-4866-A886-F64DB9C7D2FA", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.10:*:*:*:*:*:*:*", "matchCriteriaId": "69EF0C50-F104-47CE-89E7-BC37FE1A5717", "vulnerable": true }, { "criteria": "cpe:2.3:o:intel:manageability_engine_firmware:11.20:*:*:*:*:*:*:*", "matchCriteriaId": "3D764C7C-2C49-4149-9586-5D0140CE00FF", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:active_management_technology_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2F41472A-BC3D-4226-88AC-975E523C3678", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-premium_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B0AEFB41-300D-4541-90EC-6F736A06A404", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-premium:-:*:*:*:*:*:*:*", "matchCriteriaId": "54563F87-598C-4301-95C5-A582A78E3D64", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-deluxe_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF442E72-096E-40C0-9258-3E2474545E2C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-deluxe:-:*:*:*:*:*:*:*", "matchCriteriaId": "54781F85-88B1-488F-A33F-442947CDA125", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1EEE05D-D9C8-44C0-A8BD-D6A262A79CF0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "9606205C-88D0-44BB-8052-1E78C512DEB3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDE25BF7-37DE-4F90-81FD-D95A2A3031BA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "95C71F90-C6E8-49D8-AC7E-1BC2FF49BFA7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-ar_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "37A4CC55-E868-4174-8FC1-23FBF75A973F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-ar:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C9CE58F-3A49-41B8-B9EC-F901AB83D861", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "277B4C76-D04F-467B-8367-E51F74E21ABE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "82DC9901-B4D7-4FD6-86BB-B75FF30CB11A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6701855F-2D7F-4559-A8D1-CF8A8C999B91", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "E66B1596-8BAA-4805-8D49-9C42E270B219", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB1F7656-9A1F-409C-BA46-BD1B979C25F0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D7EB86B-7BC7-4D34-9EDE-04564FEFEDAC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2357072-5ED5-4DC9-BF2A-AE6F85C6C240", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCC3417D-44A9-489F-A440-8D3E75DD3586", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170m-plus\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "01833F6B-F38D-439A-B84A-047DBC75F71F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170m-plus\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "89756DDE-8EA9-4135-BBA8-0707FE3D81B6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170-p_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1249DEA2-CEF8-4009-B6BF-E0DCA5032B75", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170-p_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "4B7D4616-0DCA-4168-8CF4-7055AA922E2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170m-e_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "57BB2B24-1B03-46DE-B4F9-CCDDD83FA28C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170m-e_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F309D3DC-E2C2-406C-B742-71CAD9E4A568", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:sabertooth_z170_mark_1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D42A2157-8724-4CF2-88F0-048231320354", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:sabertooth_z170_mark_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "283B693A-D720-411C-96C9-91E356A97FD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:sabertooth_z170_s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7868F0B3-ED86-4C00-A227-CFD8A14A0790", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:sabertooth_z170_s:-:*:*:*:*:*:*:*", "matchCriteriaId": "45195F20-5E26-426A-A272-5B6342BD06C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_extreme_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A77678DA-7926-4688-BFC6-9C989985C633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_extreme:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C33821F-3755-4301-B808-806F918FF06F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_ranger_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE0AF7AF-0416-4E40-9F18-74B89E0E0F47", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_ranger:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BD49CDD-10C4-4795-BCEF-132FDB6A25CB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_formula_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1763A28F-2ED5-4309-9C02-0587DD2435CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_formula:-:*:*:*:*:*:*:*", "matchCriteriaId": "334D6552-C4E3-4F13-ACD1-3BE6312E9FEE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_hero_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABF49D87-4566-404D-908D-3C5A02B0BE7F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_hero:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFCE5FB6-2F8D-4707-BE1E-26DE66C7740A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_hero_alpha_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13578BDF-A38D-4357-AD35-41BA988E286B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_hero_alpha:-:*:*:*:*:*:*:*", "matchCriteriaId": "F716322D-6778-45FD-A4F0-A773A28EA3F7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_gene_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4D318FB-16E1-4B5D-817A-2A13DF88A1D0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_gene:-:*:*:*:*:*:*:*", "matchCriteriaId": "E968C4AB-61B0-435C-BAC5-A70EC78EAD5F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_viii_impact_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "054E1398-AE98-46AB-B7A6-703F342CC847", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_viii_impact:-:*:*:*:*:*:*:*", "matchCriteriaId": "8C5667A1-AFB2-4ABF-B9C8-CB24EBFF16C4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170i_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BC1CDA2-B140-45FE-8FE5-2FAC5B3907E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170i_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E8DCBFE-9482-40F6-9C8F-E4A472767FED", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A02FA657-FC01-4795-8246-B777A7A5BCAB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "23E5CBA9-E946-4F22-A0E9-40A63380E260", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:z170_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F814D5CE-2F35-4631-BC6C-857CBBD9DC72", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:z170_pro_gaming\\/aura:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E3FF12D-3EA0-4738-9B36-ED5461C9D0C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3BE8D64-A47B-4412-AF8A-354D01DB719C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "F273293C-6EDA-485E-AA38-A4FE41822171", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77C23914-2AB4-4D6F-A438-F1762F235D92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150_pro_gaming\\/aura:-:*:*:*:*:*:*:*", "matchCriteriaId": "22CB8991-762A-46B5-8759-AF453E21FD95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150i_pro_gaming\\/wifi\\/aura_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3ED630E-C695-47DD-AABA-39603766CE2A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150i_pro_gaming\\/wifi\\/aura:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B17C450-C8E8-4255-8E23-4ABBC8664366", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150i_pro_gaming\\/aura_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7800E86-9FAF-4D42-8029-97A22AF87E20", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150i_pro_gaming\\/aura:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF81798D-F241-499D-84BC-AE647D7DA06A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "552BBFAA-A268-4DF9-AC1B-9A99FD5BAA83", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBBDF56E-375F-439E-A1A7-1D94523C6DF7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A06F70FB-E259-4957-9D86-88805F8C0753", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "91597904-8647-4109-864D-5EC577A22C55", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-a_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E32C912D-CF86-4A1B-B440-E61B3B24886C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-a_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0232EA20-A6BB-4CC9-88FE-F91BE7EFFCFD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-c_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3B8A7AC-953B-4CEE-8DF5-6B5787918CC4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-c_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B266B9C5-DB7D-41B4-BD43-F50A45B8688C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "109745AA-5210-49EE-93E2-2660FE605273", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "3990C807-1EA1-42FD-9C38-7B28E99B9630", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAFDA852-209E-49BB-9793-F2E26FAE785F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "60AB4DAC-E806-4772-96C8-F7C68930AA24", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED6011C6-C8CC-426A-BBB3-AA2698A191DA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE6C34D6-D42F-4FA3-A9A3-985F6F49704A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "638CA839-0DB1-4F26-AC1F-3B65BB2DA0C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "75E4F53F-65C2-4254-AB16-51EB04CF10DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-f_plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F0F3C11-8700-4472-ADD5-462EAC571A5D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-f_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "6381EE22-DFF3-4197-96C6-1B448D6AC9C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2BC083C-2DD2-40C5-9B5F-6CB524FD71DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "2DC8BB48-0826-45F6-B5E5-06FB66995E69", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-v_plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "82068A08-B5D9-4A79-B81E-2249543175D8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-v_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "723BF580-21B0-4FD4-8F43-F609AFD53B0D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b150m-v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C81507B7-3C02-4AA4-B9E3-4F1DF9E9465A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b150m-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "A94BE221-3E91-492F-9BCB-2538B6812400", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b150m-v3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "72FD9041-A1BF-4483-B9C2-70F8AB00C162", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b150m-v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A763DB3-F4AB-4696-B49B-9EC929E4B17A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b150m-v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30B7BF90-6D37-4211-9AC5-27F82D6DAE46", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b150m-v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D3A85B3-0576-4D31-A088-EBBEF429B2F3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b150-v7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8D7220B-8CF7-459E-9C93-FE2ED3AACC5B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b150-v7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D65B38A3-43EE-4EF8-AC46-8725EB3B4E69", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "23C4E73F-2B93-4CAE-ABDB-AF1C6C3E1763", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "42F37D51-6D2D-4325-BB0D-3FE2D5D1F2C3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-a\\/m.2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBF463BA-68F0-46C5-A948-EA233A7B493E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-a\\/m.2:-:*:*:*:*:*:*:*", "matchCriteriaId": "10021E63-ED8B-4C5D-9559-93DA26469611", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B91F6BEA-C713-4394-A894-AC40053E4FD3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "3202BBE4-8BC9-4266-89E1-02EC58034284", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-c\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "09432C60-8EC9-4FF9-9633-FF8779A5F9B1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-c\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "49991ED2-1D79-4148-8F05-DE224ADC5181", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:pio-b150m_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "30643353-C9AC-494F-B34D-4226042910CF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:pio-b150m:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0B96870-A832-46FF-AF3F-169C486464B4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:trooper_b150_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "820B589F-9D3E-4D9C-8112-C11E28F9271E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:trooper_b150_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8645FCEC-625F-4540-843D-CB56FBFABDBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-plus_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "BBF89B32-1A7C-4BDA-9A45-1FFC1F38DE29", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-plus_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EE36CBA-3C04-463E-A21A-1F489D755896", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150_pro_gaming_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6625FD9F-41FA-450E-9CD0-AC8C237C4D4F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150_pro_gaming_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "21888815-D392-4E6D-A831-F2C170E4BE8D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150m-k_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "27B7FD9B-4FD1-4B60-8394-F51A8446D901", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150m-k_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "72749164-D3A3-4F10-80FC-331FB6705899", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b150-pro_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ABC24FA1-BB23-4FB3-A35B-6BD05BA45EC9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b150-pro_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CFFAE60-468F-4861-AED3-76EAF9676E19", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-h110m-v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8ADE34C-4A5E-49CA-83CB-119703C5C2B9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-h110m-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DFC293D-73DA-4048-A89D-92092D7BE42E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-h110m-v3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5847BEF-CD8B-4B2C-A015-847CE9611EB0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-h110m-v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF1D362C-359D-455E-BBEF-9B77838419B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110i-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "16B21217-FC88-4AA0-A4AA-49E98A30122C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110i-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "E18DCD2A-3F80-461A-A04D-7BF084438E07", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-a\\/dp_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2A70E8F-6058-4776-85D7-7FBA0D6B33B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-a\\/dp:-:*:*:*:*:*:*:*", "matchCriteriaId": "14544DF1-2E6E-4A8B-9B86-2E10B5FE4282", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9229F19B-E8A3-44A0-862C-BE7DE7264018", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "49098E76-F811-451A-8D7F-1B40491A2278", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DE58681-7681-4729-A9AC-FB1317FE1168", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "59B400E0-1526-4C46-A60D-84D468B1911E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c\\/hdmi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1204092-3B5B-4243-A0F6-B16C5C661F77", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c\\/hdmi:-:*:*:*:*:*:*:*", "matchCriteriaId": "E71E3A13-644B-491C-97AA-688DA9214561", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c\\/ps_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6F8AD0F1-8E0E-46C2-9F32-F34F16CFE491", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c\\/ps:-:*:*:*:*:*:*:*", "matchCriteriaId": "38472135-237B-4EE1-8D66-D94B6F3FCFD4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "33F4CBF7-CBA2-438A-A997-ACDB83322F2C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c2:-:*:*:*:*:*:*:*", "matchCriteriaId": "767EE0C3-16EC-4D40-A86D-B14586EF9AD5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-c2\\/tf_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B122984-8F1E-4CBE-A127-2C7AA5BE1178", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-c2\\/tf:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE17F92F-990E-4080-BEE0-9549FBDAAE0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-cs_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "13D9955B-57E0-404B-B677-0F0CBAB17606", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-cs:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1D30CDF-60B0-40B6-8F3E-4C68AD2F507C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-cs_x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "61CFCE10-117B-4596-9EC8-0FD763D83445", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-cs_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "801129A7-C8A2-4D90-9C54-13FAC9B96762", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-cs\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E870D6C-4C0F-4C70-A432-FD02CE45AEA6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-cs\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA55C126-A4D3-48D5-A277-772923EAA7DA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-d\\/exper\\/si_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "927D8CBD-EF57-48E2-A80C-E27907E72CED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-d\\/exper\\/si:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D6DF281-4E33-4DE5-B5F5-9FEA95885ADF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-k_x_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "62A74624-952E-4342-BABF-9E59DE71A633", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-k_x:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1CC4DAA-79B1-4747-BE1E-69C194E6BCDC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-ks_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F8B2CA4-B41E-4900-8F85-80A472670868", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-ks:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE12AD23-6AC5-4F08-B1B1-E59F728E9668", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-ks_r1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "98B532EC-7D68-4F05-9C84-EB074A85A764", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-ks_r1:-:*:*:*:*:*:*:*", "matchCriteriaId": "B97E501F-0C7F-4BA0-B04C-C8A623F7156F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-p\\/dvi_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "75E4DEB7-3F0F-4C62-991B-5A75B27696AA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-p\\/dvi:-:*:*:*:*:*:*:*", "matchCriteriaId": "F9810952-332C-4849-BB12-1253AF76E1BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-ts_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3779667-7513-44D8-B2E5-1925594AD3E7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-ts:-:*:*:*:*:*:*:*", "matchCriteriaId": "C795E996-2996-4731-A78E-FFA9585DCD31", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2058E0D4-EAEB-4CD1-AD89-BC69858B734A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "558AF38E-674A-49B5-A023-2043C89714E8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110s1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5E83F44-B421-4B24-BE8D-561D57883E54", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110s1:-:*:*:*:*:*:*:*", "matchCriteriaId": "38AAA664-8BC3-413F-BB92-8BB6B3690EDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110s2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42CB2BDF-E9BF-4049-8D44-FD660AC60AAF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110s2:-:*:*:*:*:*:*:*", "matchCriteriaId": "81F53F8B-379A-416E-A44D-38ED9499A120", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C47313A-2FBA-49AD-AD68-5F817411D994", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A0232650-B917-4734-B322-D12ADB06B435", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110t-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48BC9BDF-0562-44FE-B2A5-F8B26B98D94D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110t-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "70A3F2A5-56BF-41E8-959B-0AFFCC130361", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-a\\/m.2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B4A88EE-9112-40B0-8A11-4841550B5C3A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-a\\/m.2:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A4787E-F9CA-45F2-B43A-3C9BAD580204", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D757A98E-209C-4391-9B7B-2CD60D5A4FB8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "A12979DE-AEC4-4D51-8E0A-E714C85F6D7A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-e_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8FC08CFA-0254-41A0-8599-7F1033782B2A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-e:-:*:*:*:*:*:*:*", "matchCriteriaId": "6367721C-A009-45AC-B272-8290A8331284", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-e\\/m.2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9617970B-9C4B-47D3-982D-8200BC52D0E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-e\\/m.2:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E1915CF-2419-4C1B-80B9-8D29D379E1FA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-f_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "179BC9DB-AA35-4A54-8EB3-1DB295727997", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-f:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1B8722E-E334-47F3-A3BE-B9AB798A5305", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E65AAA6-B29F-4859-9A99-591F6BD1371C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "D182935F-8629-4F9D-925D-A166007B446B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B54A67BA-C862-4BA0-94D2-13362FF2F26B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "975830EE-92F4-4614-9AE8-E9D5DBADE414", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:trooper_h110_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D12B0228-80F1-466D-86F2-57F7E7BA4095", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:trooper_h110_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B75FEA3-D643-4348-9FA8-07D3127C8D88", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C6C8818-47EC-47B5-980F-5109C56C5C1F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "85E4C230-C8B3-496E-9012-5CF032D420E0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-r_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D7952968-C3A8-40CA-8000-74B23C112AB0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-r:-:*:*:*:*:*:*:*", "matchCriteriaId": "1C05633B-3CD2-429B-9239-DB6F189C8C79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h110m2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "87D53057-61DA-498B-B76D-6FB0FD50BF61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h110m2:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E222A3E-2E1E-4B46-A6DC-E91831CEA856", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h110m2\\/fpt_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C7A40AA-4A94-4DB5-ACE5-048E7E1C998D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h110m2\\/fpt:-:*:*:*:*:*:*:*", "matchCriteriaId": "D149B106-67CF-49A1-AE7D-CE3F3BC3F266", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h110m-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FC93A9D-E01B-40CD-95C8-A82085358E16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h110m-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "3E3D7210-68E7-4D3D-B65A-F7C200C07A95", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-k_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "22F82466-28C5-4495-876C-4697AC0834E1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-k_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "99B2BCE6-8BA3-4A11-B030-F571346AB3B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h110m-a_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "137F1817-ED86-4371-8553-70D415802E23", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h110m-a_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB077E96-C7D6-4314-92B3-52ED4B6C10BE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF58ED92-6E4B-4130-BAB0-81DA31518E6A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "B037D858-125F-4762-8DA2-09BA7807898D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170i-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BC8AEFC-6BF0-497B-8BAF-7DA3EFB8FBD2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170i-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "1297573C-0F72-477A-B85C-0ED65412E893", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170_pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEFFDE24-215A-43B8-9B3F-D73B52ECFD15", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170_pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "BED2A131-07A0-4E8B-8015-9E55DC1C6BF2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "513A1D93-DE0D-4455-95C8-FC7AF72677D2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "59B4013A-5F8E-47AD-80D5-526A68281515", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170-pro\\/usb_3.1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "982E919B-4936-4BE3-955C-82FFEE504807", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170-pro\\/usb_3.1:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F7415EB-47BE-4F88-8310-9BB1CF0EF299", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170m-plus\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "04DD6014-6CF9-45AC-8A2E-0AD946B811C6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170m-plus\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FE848FF-BB23-4D4F-AFFF-45EC87315A67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170-plus_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "756F0FED-9E9B-4540-A425-F7534C4BE070", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170-plus_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "918AB13E-43F3-47F2-98FA-56FE89CFB1FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:h170m-e_d3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C797373-3D39-45AC-BF51-4D0FF6471D83", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:h170m-e_d3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B7EC3FF-81AF-40F4-98D0-4A1DFB937222", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b250-v7_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A3D72C50-E023-44FE-B44A-EBB96883F234", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b250-v7:-:*:*:*:*:*:*:*", "matchCriteriaId": "895AA24B-1419-4E66-8BE1-7D3439496FCB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250_mining_expert_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5BF02AB1-1C94-48A1-BCBD-A50F049DCA97", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250_mining_expert:-:*:*:*:*:*:*:*", "matchCriteriaId": "79A2E62F-94DC-4F76-BFB5-96B45E8E3364", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4BFF834F-54FD-4427-86BC-59CACB5720EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-d:-:*:*:*:*:*:*:*", "matchCriteriaId": "FFFE0FB6-3E57-420E-BAFD-89C67EC8798C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FC5BA59-2868-4066-B557-A337FCBEBAEE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D54BCF0-396D-4AE9-BF98-408A30C23DFA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "712F55B3-C78D-4BB1-AC61-C6789997F830", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2EE19287-8C71-4161-94C5-B31A2CA907FD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-j_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6AD1F89C-B419-43B7-8CEC-BBA00C0A33B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-j:-:*:*:*:*:*:*:*", "matchCriteriaId": "E868B563-75A7-4E94-875F-BC0EA7AA228A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5DA489C-E6A4-4F30-9CBF-D532D4DC4934", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "1E0A4463-96F7-4516-B91C-DFAFA98358D5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "42625B8C-5163-43B9-9DC8-E8AB1E1A6CF3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "6721CA1E-EEAC-4CF0-BB0C-4AE44049CDC6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB59C47E-47B5-41C4-A142-E818589D86A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "4512943B-7794-454B-A0AD-D1F7C23D00BB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FB07DCB-5D90-4BDA-8277-99211DBB3BF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A4EC730-8E50-4274-99F8-B6A57C843546", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_b250i_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C4A7BB6-6E6D-48BD-9539-E01C801E2CF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_b250i_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "89865346-0EC6-4C1C-92CC-231ECE6AF73F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_b250g_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F70AAD95-7460-49EE-BA18-4A9826658CDA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_b250g_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C326D51-0C5D-48CE-AF7B-73DF1BD08F67", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_b250h_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "900ECAD1-0290-490E-BB94-82667C13B829", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_b250h_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "0760F2E1-5A01-40FC-9A2A-05C769D05986", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_b250f_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "20419867-19A3-41D0-AD4E-866B47035EF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_b250f_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "97D572B8-0F2C-48A9-B397-DA1FE92844B7", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250m-c_pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E49CE82-A630-4BBA-AE5B-35E1D7FF299B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250m-c_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBE24086-8BC1-4B7C-BB2A-D4623A2841C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250m-f_plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B9941B2B-CE46-4669-947D-2BA09DEF6B1A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250m-f_plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "CE77E05B-54E7-4691-AF93-ADC24AE07D9F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250-mr_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "34DA5C31-71E8-4CEF-AEFD-0BD468E98870", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250-mr:-:*:*:*:*:*:*:*", "matchCriteriaId": "118522B5-3E87-4D27-9FC3-13F3AE4651BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:b250-s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6C02BD4-E46B-467A-8441-633933EE57E8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:b250-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A270BEB2-4073-457B-9E7A-041F25B00A70", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b250m-v_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "4494A410-658A-4DC7-85C6-3792D4A4636D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b250m-v:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D5BAFA0-2A5C-47A4-BA7F-B5C6A0436A5F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b250m-v3_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D6928685-947A-444F-B242-55B30F2BD495", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b250m-v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0170DE0A-DF4E-4881-9C66-9BF005897F12", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:ex-b250m-v5_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F713C93B-03CC-4688-8590-81C84C52D10F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:ex-b250m-v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1D5135C-B68A-4D60-89A7-AA3FF6DC8508", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:pio-b250i_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F194921-25DA-40AD-AC77-A5C886E653DB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:pio-b250i:-:*:*:*:*:*:*:*", "matchCriteriaId": "16DB8D6C-64B9-4F5C-AFBB-EF32A2EF1949", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B3E1D43-964F-4AC3-B0AA-E7D30F2135B7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E50A677-E925-4E60-8F81-FB8E4A8CCBF0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_b250m-plus\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD09D5B3-575A-4941-99DF-C1CCB324EF0D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_b250m-plus\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "70A7A86F-A63B-4F2C-AE2C-7F321CA7E017", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h270-pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "894292B4-B683-4AE1-ACA0-07E14A7CAB04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h270-pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "78B312D0-771C-4C55-92E7-E19A82201B94", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h270-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A889C5B-AA38-4BEC-B9D9-C20BCD51ED34", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h270-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E8466D0-3102-4301-8F34-69FDF5E2F760", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_h270i_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C297BE7C-ED2C-4E7C-888D-78C9246D3F4E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_h270i_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "D92BB8F1-1C5D-4DDE-8A35-CFC96EEE2A7F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_h270f_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "76DB8A91-69F2-4028-AC04-B0FFCCFDD882", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_h270f_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "C85379BD-1976-43A2-87D0-B690B4A9440F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_h270m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "369BF713-2229-493B-902C-D23F3DFE504A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_h270m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DB699E7-4212-46C0-BBA0-A3A08AD6C225", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_extreme_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "3C399C14-6B6D-4CFC-AB98-94FCA8B982EC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_extreme:-:*:*:*:*:*:*:*", "matchCriteriaId": "A32D2A1B-DA72-4FF2-A1FD-804B1A3671B2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_formula_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "072786FB-D929-48A9-BBB7-7EC3899DC9A1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_formula:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCA041A0-8103-4742-BA97-FD28DD2EDEE0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_code_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "86C5F146-C7FD-4479-8E11-7443DCEA38ED", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_code:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA3A7B7-27CF-467A-B387-1B5D6120C0B8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_apex_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CBCB7188-8D72-4619-9779-73B6586A18E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_apex:-:*:*:*:*:*:*:*", "matchCriteriaId": "92B48FFA-7FFE-44AB-9528-0681F631C1FE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_ix_hero_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D402D3D7-319F-45D7-A5A2-8D1972D92F38", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_ix_hero:-:*:*:*:*:*:*:*", "matchCriteriaId": "49D75118-242F-454C-97B6-9C50330E82BF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "20F905D6-74DD-4547-82CF-AB43E3DD5AA7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "D84124C1-41B9-4963-9E2E-F84E356D2EC1", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270-ar_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "60D56403-47C2-4321-BEB9-E08D392AE2CC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270-ar:-:*:*:*:*:*:*:*", "matchCriteriaId": "A522350E-2FCE-4DFA-A660-7FA0CD1462C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270e_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED821805-43F4-4594-8B34-9369A4A51919", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270e_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E59CD1D-24F8-40DD-BC34-1798B9BFD142", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270f_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "47B55966-2BE6-43B7-B3B1-5AC2E476029D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270f_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "F80FE467-6745-462E-9602-D99EEFE4496F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270g_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1D51FA0-90A9-479D-9F0A-D0A8BFC5C6E0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270g_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5D0B584-4C98-4C58-B098-153A07FA7B7C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270h_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77D33D60-DE04-4189-A8E6-B453F566970A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270h_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "122BD789-E195-48C4-8043-E7C911809AF6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_z270_mark_1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F5C6507-2A00-4BEE-A2B0-9D0099DF4EC6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_z270_mark_1:-:*:*:*:*:*:*:*", "matchCriteriaId": "52653418-2D8C-464A-806A-0E5BB7C70C58", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_z270_mark_2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4AB056A-3C43-4C1A-8ECB-C8ACF645FFB7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_z270_mark_2:-:*:*:*:*:*:*:*", "matchCriteriaId": "098C6278-2B15-4D35-BDAD-6EABB5DE4A2C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270h_gaming\\/k1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE33B2CC-C64B-4983-928A-BE8332458922", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270h_gaming\\/k1:-:*:*:*:*:*:*:*", "matchCriteriaId": "57DD3BFB-3AC5-43E8-AF3D-AA9DDC0E0B68", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270-k_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "63602AEB-A984-4556-B7B4-906BF0B1C4CB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270-k:-:*:*:*:*:*:*:*", "matchCriteriaId": "69CACC60-EF0C-417B-8927-CBFDB90DE31D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "D434C2FA-C27E-477F-A82E-4DB6B29F3162", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CBCF0D7-EACE-4368-AE89-F4B70BD583F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z270i_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB7FA773-033A-4502-A675-25AA640A9C61", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z270i_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CD3456D-04D8-4269-9971-D9245185FB63", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270m-plus_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4AE1333-6F84-4D66-B5D0-C4FE8A3360A8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270m-plus:-:*:*:*:*:*:*:*", "matchCriteriaId": "801BA881-11C2-4042-87A1-6FDC643F2F39", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z270m-plus\\/br_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "7710F47C-C723-4F97-8A17-1BA8F1005255", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z270m-plus\\/br:-:*:*:*:*:*:*:*", "matchCriteriaId": "93B6459E-CE0C-4344-8D63-C0116AB32796", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B69866D-4F3C-42B3-9B20-62137551CE9C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "B346C94B-7A59-47A1-B2F6-A888968B7FE3", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170m-cm-b_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F09095A-1795-4FDB-A1B5-5FC584E1191F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170m-cm-b:-:*:*:*:*:*:*:*", "matchCriteriaId": "88504A31-F003-4344-BD7E-A1D5F0970FB8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170s1_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D61D6C5-4FB2-410D-A74D-1792054C6C04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170s1:-:*:*:*:*:*:*:*", "matchCriteriaId": "5650BA0D-6066-42A2-8062-3FF81009E10B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170t_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A3B9CE8-C405-4C88-A6B1-5D5A3414096D", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF01DCA7-9A31-4B2F-A34A-FA45E97522F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170t_v2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "77F596F0-6418-4D20-86C5-B48B027EC265", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170t_v2:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F40FF26-207F-41C7-8E82-7AD6681AE0DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170m2_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "59E33941-7E24-4FC8-941C-CC62B6B58822", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170m2:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6B670DE-DB47-418B-A2C4-E68C49C2FAAE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q170m2\\/cdm\\/si_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "69369624-8D90-4A2A-8B85-8884AC5CBD28", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q170m2\\/cdm\\/si:-:*:*:*:*:*:*:*", "matchCriteriaId": "A851E8E1-B1F0-4083-AFA8-3F59779F0206", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_q270m-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "AD61F9CE-68E5-481C-9711-B40343FF90CE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_q270m-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "56E41F36-3579-4AE4-8E7E-20D81962EA79", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q270m-cm-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "233065C5-57E6-40E5-8A52-AE6D6F7196AA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q270m-cm-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A571EB0-25AB-4450-8847-042749CE5F7D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:q270-s_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8030ED2-0286-420A-B514-AC986C2700BF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:q270-s:-:*:*:*:*:*:*:*", "matchCriteriaId": "F4E56764-2A59-4B73-89A1-9D391FE33D5A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_j3355i-c_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "0520B4BF-4363-4747-86A9-5D481927CF4C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_j3355i-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "94719387-576F-4949-AA4D-6C8453085EBB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_x_hero_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F854F8A-CD36-4721-A1D2-5E6EC5D9FF45", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_x_hero:-:*:*:*:*:*:*:*", "matchCriteriaId": "9820DF03-00B5-4363-AAE7-9D8F2FCBA91B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_x_formula_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA24153A-AE9B-4F76-9DFF-E00AB46744BE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_x_formula:-:*:*:*:*:*:*:*", "matchCriteriaId": "86DEDFC2-7A73-40F6-BDCB-8E135BFC4EBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_x_code_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "53223DBA-DAA1-4942-92D1-68B7647D07AD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_x_code:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E633481-0AD2-4291-8653-FEB3DA5DA279", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_maximus_x_apex_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "272713A3-B88D-405B-AF30-FC6E90F2E3DC", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_maximus_x_apex:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCE784AA-CC5A-4995-92AC-28073BABD832", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z370-a_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8260D7C-031B-489F-A7B9-1DEFC846BCD5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z370-a:-:*:*:*:*:*:*:*", "matchCriteriaId": "B4A56C38-B2C6-4F19-806A-9346190BD7AE", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:prime_z370-p_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1536F2E-3181-4897-8ABD-AB2B939DF992", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:prime_z370-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD78127D-4BCD-4733-ABC1-D8558BE07C3E", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_z370-pro_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1419951-3645-4CBF-8EE0-209DC1727E92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_z370-pro_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "E78CF821-AFD7-4E76-BB94-A45495ABEC37", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:tuf_z370-plus_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "060358B9-3630-421B-9366-F726D19C15D3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:tuf_z370-plus_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8678C89-35A9-4256-AF4A-CC3A11BDB540", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-g_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "1579A407-454F-4838-8850-8D4057507C8A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-g_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A138826-DC79-4620-9142-2B7030DFCEAA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-e_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F050E14C-429C-421D-A01C-CC8E1DB40769", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-e_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "087C89AA-9876-4754-B2B1-CAE4F86D1375", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-f_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "F62BFA52-B89C-410E-9FC6-B6F39825515A", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-f_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B49B4BB-6D24-43A1-81DF-E786DFA600F2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-h_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "48EBFFF2-0AF5-43F7-AAC2-89F4625F9185", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-h_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "271701A1-CFD4-4781-9F81-3255D90F8EE2", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:asus:rog_strix_z370-i_gaming_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6681601-99E9-492B-86BF-9C3BE23D1E9C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:asus:rog_strix_z370-i_gaming:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA8A2D55-C766-4E90-BB0E-2D912F17C768", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m3_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A15E9E54-0414-4C67-9DCD-181FCF2EE838", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6127C45-E91E-46B7-A806-FC0068575DB5", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4487A96-6AF1-4F41-9FF7-ED711FB89FA4", "versionEndExcluding": "18.01.06", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7ADAD919-32C1-49D2-A419-C9A803DB6250", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E79A718-EEED-4C35-8B3A-8BDEFBC55282", "versionEndExcluding": "22.01.04", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "EC70C5D2-748E-4D6C-ADC9-ED098541C8F1", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E74F55B7-DE3D-4D74-A7E7-9BCB8F7B114A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "A87041DE-EA8D-4DC1-BD7C-03C42C6EE7FA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427d:-:*:*:*:*:*:*:*", "matchCriteriaId": "46CC8AFE-ED6C-4A50-AC80-D2309E03FAE4", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "FDFE3D1F-F8B4-4682-BBCC-2CBD3CFFFBD4", "versionEndExcluding": "21.01.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477d_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "631AF2A2-F925-45CB-82DE-39053016F5B3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477d:-:*:*:*:*:*:*:*", "matchCriteriaId": "754A6744-5194-4A99-BD3B-944A8707C80F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477d_pro_firmware:-:*:*:*:*:*:*:*", "matchCriteriaId": "71E7F6E0-9D8F-40CF-BC30-43505FE0CC16", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477d_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAA84FF5-0C2A-48DE-94A5-ACB5B01E03EF", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "90723D2B-49B7-4F70-9DD1-DE9F602E8DA2", "versionEndExcluding": "21.01.07", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "42E364B9-1FC7-418A-860D-DD0E73DD930E", "versionEndExcluding": "7.1.91.3272", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547d:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DCF5972-C72D-4DE9-8B73-3C497D54596B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2CD389CE-AA26-445D-8D2B-27D3D06C3B68", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547e:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9DD4A97-1648-4C7F-A5A0-6899BD13A617", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BBC1791E-E3B5-4B75-B816-9EE20F44D9D6", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627c:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD1A57A9-F6E5-4672-BD22-09EF5522CA10", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "042B60E7-0614-4EB3-8B47-07DEE5B5E274", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627d:-:*:*:*:*:*:*:*", "matchCriteriaId": "509AD120-3465-4C00-AAB3-B6F6ED708B51", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6E9D150F-BCE4-4FB6-BBDE-4A55F12DBC37", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E752006C-6D94-4B14-B3A5-C9BB94141BDB", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A9EE1C2A-FCDB-42AF-8B3E-A805F12A74C9", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0EF28FB-BAB3-4710-9D25-25F67ACADC60", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F0583DE-EBB9-41C7-92C9-4E4E259F28B8", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677d:-:*:*:*:*:*:*:*", "matchCriteriaId": "057D9947-CE4A-4B4C-B721-4B29FB71350C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3C5DA136-7541-44E4-B8DF-065CEE065A99", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827c:-:*:*:*:*:*:*:*", "matchCriteriaId": "1FFD2D72-5464-4B86-BACB-61F55A081C3A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc827d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "6C37BC27-C5B9-4740-BDFE-9439FB248CE6", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc827d:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6D87239-40C1-4038-B734-D77AC4DDD571", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "B5C3B3FD-7CF7-4172-87EC-11C129D5508A", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847c:-:*:*:*:*:*:*:*", "matchCriteriaId": "687E1212-EC5A-47BA-ACAB-74F6C98B7C34", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847d_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4EAE137-9336-43D6-AF8A-9161F236BD14", "versionEndExcluding": "9.1.41.3024", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847d:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F37D88-E086-4060-8420-BD0F8D8FF580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2F29FED-7876-4801-B0B1-BC06A30B1310", "versionEndExcluding": "23.01.03", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simotion_p320-4s_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "3AD2CE43-B3B3-480B-A607-BB5817B43256", "versionEndExcluding": "17.02.06.83.1", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simotion_p320-4s:-:*:*:*:*:*:*:*", "matchCriteriaId": "A49883F4-8360-4895-8E9E-B274A35BDE57", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinumerik_pcu50.5-c_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "BF57DC28-0EF6-4610-8B3C-587B79740D25", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinumerik_pcu50.5-c:-:*:*:*:*:*:*:*", "matchCriteriaId": "E921D034-33C4-4526-8F94-98D580922409", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:sinumerik_pcu50.5-p_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "578D9CB9-6831-41C5-99C3-E1940562F118", "versionEndExcluding": "6.2.61.3535", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:sinumerik_pcu50.5-p:-:*:*:*:*:*:*:*", "matchCriteriaId": "8CE0F71E-62D3-463E-9CE2-E088D6D3F05A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple buffer overflows in Active Management Technology (AMT) in Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 allow attacker with local access to the system to execute arbitrary code with AMT execution privilege." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer en el kernel en Active Management Technology (AMT) en Intel Manageability Engine Firmware 8.x/9.x/10.x/11.0/11.5/11.6/11.7/11.10/11.20 permiten que un atacante con acceso local al sistema ejecute c\u00f3digo arbitrario con el privilegio de ejecuci\u00f3n AMT." } ], "id": "CVE-2017-5711", "lastModified": "2024-11-21T03:28:16.290", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-11-21T14:29:00.510", "references": [ { "source": "secure@intel.com", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101918" }, { "source": "secure@intel.com", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039852" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "source": "secure@intel.com", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "source": "secure@intel.com", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Broken Link", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/101918" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1039852" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-892715.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Vendor Advisory" ], "url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00086\u0026languageid=en-fr" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20171120-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.asus.com/News/wzeltG5CjYaIwGJ0" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-02-03 02:15
Modified
2024-11-21 06:26
Severity ?
Summary
An issue was discovered in SdHostDriver in the kernel 5.0 through 5.5 in Insyde InsydeH2O. There is an SMM callout that allows an attacker to access the System Management Mode and execute arbitrary code. This occurs because of a Numeric Range Comparison Without a Minimum Check.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | Third Party Advisory | |
cve@mitre.org | https://security.netapp.com/advisory/ntap-20220222-0001/ | Third Party Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge | Vendor Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge/SA-2022023 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20220222-0001/ | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge/SA-2022023 | Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "A4803E0A-D93A-4863-B9F6-378C3D73F743", "versionEndExcluding": "5.16.42", "versionStartIncluding": "5.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "65D09B40-7B64-4890-AEA5-AE1EB5201CA1", "versionEndExcluding": "5.26.42", "versionStartIncluding": "5.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "E38FAADD-CEC5-421F-BBD7-1152B95B2A10", "versionEndExcluding": "5.35.42", "versionStartIncluding": "5.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "18B07541-9DA8-41A0-9D69-861C159AB6AA", "versionEndExcluding": "5.43.42", "versionStartIncluding": "5.4", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:insyde:insydeh2o:*:*:*:*:*:*:*:*", "matchCriteriaId": "7F835C39-35FE-45F8-9314-C7E072F3627D", "versionEndExcluding": "5.51.42", "versionStartIncluding": "5.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m5_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "324ADC7E-AECD-4B7D-8571-5399542C2BF6", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m5:-:*:*:*:*:*:*:*", "matchCriteriaId": "506DEE00-30D2-4E29-9645-757EB8778C0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "480C5657-5C05-40F5-B76A-E67119727ED8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc127e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "2AEB5AD1-3973-4150-BEA2-C9DE0B98222F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc127e:-:*:*:*:*:*:*:*", "matchCriteriaId": "F63C0B17-60E2-4240-92FD-4B7C7D8F2C8B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc227g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "C3F52F29-0ACF-4ECC-927A-0CB27399E5D9", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc227g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D1E85AC-1305-4C5E-AD8B-39B2654F6057", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc277g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F203C449-2B5C-47A1-BF3D-8DCFD29F0B18", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc277g:-:*:*:*:*:*:*:*", "matchCriteriaId": "320F5752-86B3-4C08-89D0-02272753A6D0", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc327g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "A37FB5EC-BB64-472C-81FC-8EEF238E3C12", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc327g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC7303D1-CC95-42C7-B843-C3B3B3336669", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc377g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "45013BCA-3897-4D58-81FA-D8CB9D19268C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc377g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDD6F034-BC50-4223-AE5D-319F04C866A8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6422BF3-01B7-443B-BD2B-80E45D7C3F5F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "696F47E6-C1CA-4A58-A91F-4B3EA92954AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F712060C-ECDB-4BC7-B9B9-468B41DE615B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D511C170-65E5-416D-B7CE-557A503F25AE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "577C19F5-82ED-46DF-91CC-A074DE99EBDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEF4592C-5DB3-45F4-B354-59701BBA0C08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87F0538B-ED6E-40C7-9C2A-4C5DC3D2935E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An issue was discovered in SdHostDriver in the kernel 5.0 through 5.5 in Insyde InsydeH2O. There is an SMM callout that allows an attacker to access the System Management Mode and execute arbitrary code. This occurs because of a Numeric Range Comparison Without a Minimum Check." }, { "lang": "es", "value": "Se ha descubierto un problema en SdHostDriver en el kernel versi\u00f3n 5.0 hasta la versi\u00f3n 5.5 en InsydeH2O. Hay una llamada SMM que permite a un atacante acceder al modo de gesti\u00f3n del sistema y ejecutar c\u00f3digo arbitrario. Esto ocurre debido a una comparaci\u00f3n de rango num\u00e9rico sin una comprobaci\u00f3n m\u00ednima." } ], "id": "CVE-2021-41838", "lastModified": "2024-11-21T06:26:51.543", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.2, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.5, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-02-03T02:15:07.080", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0001/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2022023" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-306654.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20220222-0001/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.insyde.com/security-pledge/SA-2022023" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-09 19:15
Modified
2024-11-21 04:59
Severity ?
Summary
Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44332FD-46C6-4E7A-B400-7B93D179CD49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "39FD6F9C-FEEA-4D52-8745-6477B50AFB0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A4FD69F-FF53-43F4-97C8-40867DB67958", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BC3C45C-FACC-4890-992F-449DF6F06E11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA08C262-414E-401A-8F91-131626FA82A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1978F85-5BA5-468E-B797-7FA7EB4F489D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8D3D0CA-C981-4091-99F9-203DA8F156F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB23D0C-D2BC-4E7F-94AF-CAF171A64307", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CC9312B-40A7-4D4A-A61C-3BA865C29F63", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EBECBE5-2BF0-4175-81CC-C6D054C819B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB33CC4F-9D51-4A11-B063-6E78F0D71555", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", "matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", "matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", "matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*", "matchCriteriaId": "63719B1D-5A98-44E3-80D8-CF0B4C1C6F80", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5365D3B-1B0B-416D-ACFB-23843FD25EAF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "5601E40A-96E1-4321-9682-055A1C607488", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF36D9CC-2FD8-4D08-8712-E625D4754613", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A59A0C-91F2-4AE7-AF60-D98059542438", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*", "matchCriteriaId": "3252CF19-9D1D-4A46-9C94-0E7255CDDD8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "E11C7F38-3313-4F6D-9D5D-E61C89E716B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "70B0C976-3B68-4647-909A-5D574D711C7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA18192E-7DBB-45BB-8568-CA7159AF8CE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2FDB568-5340-4DD8-B933-1CD64C370BD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28DF93B-E15D-47D3-B9C0-4AEE8B7FADD0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F2DD1D-DB6F-44D1-BE3B-C798C09CC5F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "12ADA9A2-6E64-4F17-B369-816639F0D3BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*", "matchCriteriaId": "514B7B5E-D60D-464A-8CB0-273044FD2E09", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFB608EE-83AF-4192-93E1-7DDBA5F6A54C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "B807B5D8-BCDB-4398-8ADC-DBD1BD8D2B88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6498du:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BE4BE78-2A6E-463C-A7A9-D1C8FE20A984", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD248D-0B95-4BE1-917F-E0976447927D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5726D5D4-F188-4F06-B78A-2C7C694A40E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*", "matchCriteriaId": "72467515-7793-479B-BABF-839275CA9AAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56B79264-C756-408C-A32A-BFD4AA0B20CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D3DB891-40F6-4000-BEAE-A1710C70C43D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3EA33F-D137-4B24-9211-C8A62A7427A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "86FFF97C-C121-4F91-B62F-057356B0A048", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "213B09CA-91E9-4D11-AA11-B84F40495E9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAFC55E4-D84D-4588-976D-1E2637B1BF0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCB20762-51C5-44DD-9CEE-FEEC1E9C0E5A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAC1A189-D822-405B-A090-B1573FE12B14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "31C57E58-66E3-4FEC-A88F-B82C4B372B2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A0BDFFB-638F-4FB7-A43A-812874D8774A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "C173CF7E-81DF-4AD5-AB17-A4C330B933D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "638549EC-1BB1-4206-B8DC-C0101BBEF8A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8F450DA-5FBA-47BB-9A7D-75873FB3E69F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "112701D9-7154-46E5-BF36-EE36A607C7DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "87B5258B-26E4-4853-9F27-4BB12886CC38", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B1B04E8-A31F-4027-8E05-5461E7855F04", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BDD476-E402-408D-9BD6-886AB195704D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D566CFB-935B-40E4-9F4E-6216A42E7EBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A97ED15-D0C6-4B64-BA08-EE50A6990272", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D57834B-C031-4301-9839-7A32F13687EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEE126ED-B743-4C6D-95FF-04F473A9A008", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D901944-8E2B-41E5-BB82-CF1C97064711", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A13E353-0063-468B-96CD-97BF91C747C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "913BBEFF-49E7-42AF-A850-B49E5A12AB98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8C1205B-6AC7-4DB5-B247-2108511D9957", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA47107D-237A-4184-8BA2-601660F7FB5C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9862E49-124E-4B7D-941A-CFD2668B6481", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE6572E2-5B24-4E21-9F6F-3A7A17A9F098", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*", "matchCriteriaId": "85C7AD56-CA31-4C08-A5C1-B50E767E1FFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93E897C-5D7B-4532-99D9-53192A1F776A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "33D0D618-D738-47F5-B7F7-C7F07972C893", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7A147E8-0778-49CE-92EF-ED1950138528", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DFC6D19-9E02-4DE5-818F-931779A41F74", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DB488DD-D97C-4E21-A055-E6CECBBBC34E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DC12C97-9966-40E2-8B23-B4453EC9EA6A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*", "matchCriteriaId": "E687CADE-6E49-4284-BD41-6CA2FDD846FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A7540F0-7EB8-4F64-AA31-9AF3D79BEC46", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*", "matchCriteriaId": "404409CA-326B-425D-A4E5-1A3C8CC45344", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA5E65D0-6DB9-41D2-9721-8F1232D8155F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*", "matchCriteriaId": "46066C5B-DB48-4B83-9E5E-3809D3F7FED2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4BAE58B-C0D2-466A-88C1-47D2A81E9D7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99D4F6F-5874-4F5D-91FD-E265DCE86667", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1524n:-:*:*:*:*:*:*:*", "matchCriteriaId": "41C10BFB-B05A-48FB-86FB-6AF40EB1D6A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*", "matchCriteriaId": "47DB082B-E169-4BE0-81DC-B2A7219C4DA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FA0A03C-21BB-4C5D-85B3-FF579F34E82C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD387ADD-02CA-4154-BF86-0DBE664FE5F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAB6FBF0-14B5-4DDC-BEC2-16535679B0C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*", "matchCriteriaId": "74F2A5C9-C593-4C42-A47E-F563C4696137", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA7576BD-43FE-44D2-A665-F78BDA4D964D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDA12CAD-F622-4F14-8847-AFD8DC250B40", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA062554-DBBC-4215-9705-1ADA545B5887", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCCDD79D-80C4-4A52-94F6-F30237AE0C53", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC6E2595-D9E7-46D6-99C8-336DEB1B4020", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*", "matchCriteriaId": "829702E9-C0EB-4E4B-A979-41A2235B182B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A84814F-B070-45B0-ABC2-1BAAA212EFD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9BD8917-5BEA-491C-B6E8-486FF957A876", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*", "matchCriteriaId": "B897D23E-1BC1-4FBB-AD00-422413C1749C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1563n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E72D84C-664A-4B7B-B828-DACCE31E1FEA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5C50FBC-6933-4E98-82B9-A70B1C836ED8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F8AD4D2-D48B-4F53-A0BA-A90E5A970832", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1573n:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA1AE789-788D-4B70-9C33-60C534878A8F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*", "matchCriteriaId": "971C6442-6546-440B-AD74-44A5BB527D11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1581:-:*:*:*:*:*:*:*", "matchCriteriaId": "4214A94D-84A3-48F2-961E-540093F22CE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1587:-:*:*:*:*:*:*:*", "matchCriteriaId": "B317C5AB-ED48-4515-AF96-970C0451E9CE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F4B6C48-261B-4B0E-BA2A-7E3060D01F93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1612:-:*:*:*:*:*:*:*", "matchCriteriaId": "66D3FEA4-8C82-44FD-9684-825BEA6DE341", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*", "matchCriteriaId": "41FC8B26-7611-45B6-A37D-DF7025E2E92D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*", "matchCriteriaId": "543DB437-425F-4FF7-BDBD-FB5CC17E0056", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E8DD28-EC33-489F-A71C-2AEACFB16FC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1632:-:*:*:*:*:*:*:*", "matchCriteriaId": "73D0A930-AC45-48E6-9E79-90079C3EC88C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*", "matchCriteriaId": "84B97F2B-A3D1-48A3-9FB7-755191FDD720", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*", "matchCriteriaId": "10FD9FEF-2186-4416-93B7-B743657412A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*", "matchCriteriaId": "38161238-5D40-485F-B0D2-D7621EC317D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BE4E4AC-4E1D-4F86-A8E8-8053EE1B974E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*", "matchCriteriaId": "B804174C-53DB-4641-BD26-3ECDD9FBD638", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3930A6D-64DC-4953-AD7E-EED0C48B048E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B10FCF1-F496-4166-9162-41012C4D2B16", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACAAD0F0-9182-46EF-8399-C04FB472BE6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCADFB25-DCBB-4901-9E4D-132ED49C7F26", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0327393-DB2A-455B-8E20-3EDB3766CDA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2E00698-8A08-433F-8852-8EDC422A53D8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*", "matchCriteriaId": "4925D0EA-D524-432F-8417-892BB8C3DDFA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3757F7B-4283-4ABF-974B-59E4E2358035", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*", "matchCriteriaId": "93D86199-5CF3-4E7A-8295-50F958EA4B4C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "122BD094-E815-4081-B674-B71AC193BE0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*", "matchCriteriaId": "14DFFCEF-09F5-4228-AB7F-F042C4D5CE2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2104g:-:*:*:*:*:*:*:*", "matchCriteriaId": "921B163F-7696-4C47-8FD5-1E2897471C22", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*", "matchCriteriaId": "43126A13-5931-4989-BEFD-E1A096F98D94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*", "matchCriteriaId": "342E0783-288A-4DB0-A657-29937903927C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4C40F91-138F-4396-9A6B-B969F6AC30B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*", "matchCriteriaId": "23CA9365-B1C4-4188-A9BF-19215AFF58A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4797D2E-1270-447B-BFE4-CC96D9F10D5B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA77EB3-6F11-43BC-8B59-84217AA73205", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0866F1A3-8B9C-4B5A-B30D-71B3465EC80A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*", "matchCriteriaId": "331B8F10-3A20-46A8-B960-3546271CF701", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE638E59-DF75-43B1-A6DC-10A838B05B00", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*", "matchCriteriaId": "109FA97C-10EE-41F9-B52B-B37E31642251", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67B3834-E59E-47AF-A806-13A990E812B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*", "matchCriteriaId": "79214F8B-1090-4DCD-B1F4-0FF78FC29C4A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD176FB0-7427-4F2E-A969-72062BB3EF98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B278081F-F900-4581-9D10-B5A2ACD2E2C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*", "matchCriteriaId": "45689B37-5085-41B3-BA9D-F05FD07DF1FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7186EA5-448F-473A-8FC8-058FC823ACC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*", "matchCriteriaId": "C12F0C71-8F25-4C77-A3F3-1231AC53C0CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB179A6F-FED8-45FB-89C7-3B17D6F5EB21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*", "matchCriteriaId": "F58AEEB9-919B-4C6C-83B6-080846786A56", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0BAE174-A158-4807-9D67-36F795028D76", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD38AEA-979D-484B-82F0-0161BA39E9F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*", "matchCriteriaId": "780AB9F4-0C87-4528-B53A-69FBC4D87ADB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2CA54AE-915F-45B9-B775-C04589E49802", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB86F018-1F56-4146-A78E-C7BF7B616023", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*", "matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "00912C9C-D386-445E-B390-E96361ECDFA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*", "matchCriteriaId": "60B582A1-784C-4BE8-A0D5-706DE01D769E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*", "matchCriteriaId": "320597E9-6A2B-47E6-A33C-6B31A81902EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*", "matchCriteriaId": "556637E1-9502-41E7-B91D-082C92F233A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1205_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "03469EB3-138B-46EA-97CE-4386F6A16B33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E629CF7-A706-4DD3-B3EB-A1F9711B0372", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFD11A3F-A2D4-4B09-84D2-548F97268805", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1BCDBDF-A902-43A8-94A8-13541FB8CB32", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E031BE7-87C6-4E4B-8988-020221ECAEE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CC1EDA9-6CB8-4643-AC65-76B892319879", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "49C57129-0A27-4142-BF6E-68A558773573", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DB4F8D-E42C-4119-83BD-44D6AB9319B0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "51E0227B-8F2B-48B3-97BC-73BA1BACEED8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5EFEF14-4ECB-45C9-8911-01FD7B115D7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8BD1F0B-7B75-4A5A-A708-BDE56D237354", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE01A935-4048-4578-8FBA-1D12A95654D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "333364EE-BF57-4217-9517-2C1B95B826CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D45FCBB-CC03-40A8-ADCE-7AE0A7AA05A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "28D7D164-E631-4D49-B87A-0B7885148790", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA74EB5E-3D7D-4E5A-8D7D-AF902F8BCF8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F2476F2-6A8B-442F-B054-738F36613CE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A10975-3375-4FB3-A008-56EB2ACD2737", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BC9CEA2-C621-4DCF-B64C-5495D3208DB4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6A99895-6A48-4A44-B0F7-7BED55C677FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "A32F3CD6-6BA6-40E7-9580-3C1A455B3C99", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2559D24-F8AD-4202-A00D-F48D51A0940A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "37AF4F98-0672-4101-9825-57B0F64EDBEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "2231374F-222A-4BA3-B14D-F69860668F7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "057E3667-7BA8-4142-8A1E-B957333D776A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "31BF874F-B640-4A18-AC92-F0E16AB7E1C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "84A77114-92C8-48C4-9D12-3ACC3030D5A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "542BC61B-1EA3-4C42-BB99-C9C67EE82F7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "13B5BF22-5E95-46A4-AF05-450CFD1312C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "9490F926-AD57-40F3-A523-61D67486DCB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA12E60-4B0A-4723-8A02-3115494CD1DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "29CC9B92-CF59-4121-9638-F4D4521952D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC6592D-743B-4656-B1C0-247F36ABE5CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCC32129-C5DC-4D26-96D5-219F5291D6F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "81F4426C-970C-49DB-950B-3F5ED17E682A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4ADED698-2702-479C-A24E-E9E6F35E9AFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "D86C0CFB-72A3-4446-9601-2C956C9A71F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3C578D9-8973-4F36-8BA4-9F4F3A8E0AE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1428l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "08DE8D7C-5C1B-41AE-B188-4EB1F6D6A73D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1603_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "536623D6-4032-45AC-8A5B-9816A4CBACE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1603_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "29A9BE04-4A58-4DFB-AE83-EF21935DED9E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1607_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0BDB8F0-0FA8-440F-AE6A-5ACFDFBF0B57", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1607_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FF3EE79-4F71-44EC-901D-7C6DF90B0AA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E6629A2-D63B-45B5-BA50-FB5A1EEA2801", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FF717C4-6E91-4A86-87E4-D97F70E0936E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1630_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CF1837A-E1F1-494B-84E7-017DB5F64D6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB2A5EA2-10A9-4C53-BD0E-1026D5F51B6E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6EB2911-50F8-4D96-83A1-BD9CC3FDDE87", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0B83717-B20B-4EF9-9750-5C628DE8DA6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1660_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B54BEBF-3663-4D87-8F9D-6BF1A355A089", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "19A506EE-01BE-41E1-BDC9-67CA676B8638", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1680_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5577CD1E-E032-4AC2-81A6-B90DE9B4100F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE60C16D-B9F7-4EAA-B240-92202B11F6A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2408l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BDE2E5F-6B88-4766-A90D-D29C5405EAE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2418l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2F4E95-F636-467D-A989-E612D43A46C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2428l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E83D1C5E-B0A3-4F09-ADFE-D94C8C311889", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2438l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E99224BE-1103-4426-84AA-67434C73DF08", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2603_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC006C18-852A-4539-8D2B-98F4A28432F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB17C45E-9401-4A21-B537-0432744403AC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2608l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EF72AC7-A510-475A-BA52-C1723AB6364F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "284FF890-627A-4FAC-A8F4-A9B44E3DA397", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2609_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7F5B03-F15E-43AC-BB9D-5112BCA4C580", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0F4E301-BF06-44E1-8F15-37FF5B31CB19", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2618l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "09991B04-44BC-4095-A7EB-D51962D212B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "522F7CBA-7480-43D8-A31A-B52872600ED2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBB8DBD2-6B19-4D44-861C-1B39D8D6849A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "396B0F7F-3BF1-49BF-9304-285049FBA318", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2623_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "95D11ED7-2F2B-4035-9B16-6217CD712671", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A28FD72F-F1CF-4076-9523-E355C20CEED8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2628l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "340988ED-D3ED-4F1A-A18E-4A8034794F46", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "F826234A-2C49-4E02-B586-5CD038A90799", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2630_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "397C37D9-C510-43F4-A71D-464EC1A30981", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC204334-6964-4DCA-A62B-BB71FFA5D4EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2630l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "672563CA-755C-4FBE-AD8C-D2347BCA94A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3833A360-9D9E-4CFE-9CAC-DC9F0CDA0C52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2637_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6C74009-8116-4BB4-BFA8-F76C2462DA07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A85ED1D-D2B1-46FB-90A4-0B47EB1EED8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2640_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD95EF4-3CE6-44B7-800D-DF6653EE1EA9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E1EECC4-C82D-4871-A554-61A15A496E90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2643_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D1FCB01-384E-48CD-B2BA-689EE3F6392F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "209DE5F9-D191-4720-A53E-1F39BC6567DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2648l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B917B344-9B5D-42D6-B824-C5C9F3835F41", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "963AD924-07BB-4E68-B817-AC2A82A5C7C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D7C0BC0-0735-4B74-BDEF-209276A1C355", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A738A2D0-FF0B-4E75-90F7-E0E39D937C5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2650l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEBA2D48-60D1-418C-8433-0159F2BBB9E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE67577F-3B63-4995-9E51-19647F4EBB3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2658_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "30E02D4A-975B-474D-91FD-5A000288314E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A081C35C-0D19-4025-AFDE-C3E4C4462124", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2658a_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "00380A58-37CD-46E0-8969-488F2A18DA8D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2660_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "659BCA41-19B3-4C72-A4AA-05B02B02F491", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7571BE1-C7C8-4FA4-81B3-9F0F7BED5840", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2667_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "A128BADC-97D1-4781-BDA2-31F5655EE91A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "72781DBF-E6D4-4BDB-BD6E-9B86EB0224A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2670_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B0E8EC3-F041-4AF2-9401-A848845D691D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2679_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "1833D3EA-CD65-41D5-A9DA-018FC4245981", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2680_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02904FD2-A03D-4332-8AC6-BA371E43D4A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAC3D549-9EF3-436A-B672-693CB1D5C14B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2683_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA56AFF2-32F1-4153-A89F-F86C0A2479DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA406873-E126-402A-BBD8-46BC22AC4756", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2685_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "530D6B53-F366-455D-8528-847FD5BD5397", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2687w_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "220D6074-7F5E-4ACC-AB83-919E6B96D29D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "953C8F85-28B4-4458-A4F0-2D55336FE34C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2689_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F26DD7-5D32-4032-9C22-F4D0C8F7C34D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2690_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F64B80DD-888A-41E7-939A-FD76097B62FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD63CDF0-0EF3-4370-9F9D-FE3DF07E39AC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2695_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "54F6F82C-1960-4178-9B50-B881C57ABA86", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "29A3A2F8-3908-4083-AB72-301A825FBD1A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2697_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "52DCEE26-2A9B-430D-9FF8-E08ECE03327F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "9203112A-2E5C-4EF5-B34F-74E66838BE3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E995666-F7F9-42AB-83DA-AE4202B59A90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2698_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D3471A8-01D0-46D6-AD28-F56D28672DDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0DAE24C-19F7-46CF-AC3F-E38066FCE0CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2699_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C896D1-EF28-422D-8215-504E6F22A4FD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "C830F688-BCE6-4A86-9C58-DB34505EC366", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "124DF9B2-F703-42BF-9737-1777A51D05D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2699r_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "38224721-20BC-4E60-9D6E-AAF033C88C3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4610_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "83311344-22A3-4F0A-B9C5-79DDD6D0575E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "C77023B4-99B8-4C36-B384-68445D28783E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2397DC1-2F80-4C14-B853-5866541C1599", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE8104B9-EA92-4AFB-829A-35FDF9E1FE4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4627_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9144C66B-9838-4F13-86F0-E7CD30F1754A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C3809F-F701-4969-A27A-294D0ACB9CF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "C96C9EBB-4585-425D-81CC-9A2B0C1CF9BE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4640_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "11621F63-45AF-470B-B3DB-75D5DAB53985", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A55CAE1-0334-469F-9230-35D607A42DA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4648_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DE4FA80-47FC-4307-A9AD-020C8C2A8AFF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AD51E71-3AC1-4130-8FCC-847A42E54DE8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD7C804C-BFAA-4886-9621-C255F2F867B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4655_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B118810-DB63-4CBE-870E-BCDEE722F446", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC5D11E3-FEDE-4453-B89D-78505BD03326", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4660_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AAD6DC7-50F1-4F37-AC8F-39DE1ABED619", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "160A9F6E-18A6-4181-A63C-5F8A13985869", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4667_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FF54142-6EBD-4460-9BA0-6D530FFC9997", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1420874-49D0-4E69-BD67-26E6C9FC873E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4669_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2085B85-EE5E-4292-AD0B-9B83F9884EE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC478F61-883E-46BB-A4F9-5833A6DDE6C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "376E792F-A029-40B1-83B6-A0C2F40F4B1C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FECF753-354D-40EF-8063-FF93C7FA8B86", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "97AA9A3F-9ADA-46B6-8CEE-A46564953699", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D355937-EE3A-4FE0-B3CB-5B7E19ADE4FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-8855_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4812F6-8120-4624-BAF6-2AFF8A317302", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5B57D26-455B-48D4-BB27-6A8D84C8D5D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9C950AF-E109-41ED-8A3D-F7151216F01F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D3199C4-C5BA-4FC8-9539-21A6C3C85336", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D830FF1B-05A2-47C3-9AA0-06F75F0CF01C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD8390A9-863C-4687-BEDA-64768191E7C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "113A641C-D291-4BE5-9643-21BA1FB04101", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5AB45CA-5D82-4204-8274-7B0CD0B5C852", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3380FA20-4FEB-4F6D-A86D-A3BF81E8F8D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE862F15-69CC-488E-ABE8-1E23A5A1089F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5117:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7DB4283-69E5-4946-B20F-5716872E0AC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5117f:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAB62E38-9339-4CD6-AA7C-6AB2036CC99B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*", "matchCriteriaId": "9087D09E-ADCB-478A-87FD-B7113FD29EFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B43E11E-5350-4DDB-A743-F84D4D2286D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D64D1ED-A386-4475-99AB-7727DE67E1A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EFB4646-A5BA-4662-A47F-62407AFEDFF2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*", "matchCriteriaId": "29A923F6-E352-4752-B7D3-007FE1CAFE06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*", "matchCriteriaId": "070C20AB-66F2-4EE2-8134-5E40DBB9B9E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CA49CF7-C6BE-4337-A0A8-A603D8955EE9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C8F7F6B-847A-479D-B6B1-BBA331D06DE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C375A9D-C7CE-49A6-B08D-9CAB22E16D32", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*", "matchCriteriaId": "E06531E6-126A-4FBB-BEBB-F9023C4738F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*", "matchCriteriaId": "93B8CDF0-1489-4E4C-B004-A22E06FC10D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5219y:-:*:*:*:*:*:*:*", "matchCriteriaId": "1236D064-3A63-4F7E-90A0-FFDB0E04E714", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6ACF161-472E-4088-85C2-5940C9C88D45", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E0B94F6-EC15-4C12-8BA5-CC6602A7A725", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*", "matchCriteriaId": "067C65E5-5392-4DAF-A6BD-640D78C19CE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1647DAC-CED6-4DAF-8F82-A42D6D691DF0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*", "matchCriteriaId": "D93CC498-F558-4C2F-9E14-7897060CA9FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6122:-:*:*:*:*:*:*:*", "matchCriteriaId": "4340947E-3B48-4A0F-BCC8-C95AFC9C37B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*", "matchCriteriaId": "D609DB7E-AE80-48E0-B7B6-E622B6208ABF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A09C3656-AE49-4F26-BD28-B725E8C40304", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*", "matchCriteriaId": "90F0D1EF-2FE1-498A-AE38-BF755A680E88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*", "matchCriteriaId": "22243DEF-F01B-4774-AEC1-40D776E1167E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6129:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC72383A-6791-4A69-9DA4-167B09739971", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*", "matchCriteriaId": "25934425-944F-4B9A-8A16-F1DCBF3D5032", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A5BC76B-A4FC-4702-A544-889E62F8509E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6130h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F54A1FE-7563-42DD-9A8C-D3730AF63B34", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F4E44C3-D29F-4057-AE12-BA19FFFF69E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*", "matchCriteriaId": "383DCE68-3882-4274-AA4A-5E030530E4BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*", "matchCriteriaId": "04EC7421-963C-43F7-9450-2E204BAFF1F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6134m:-:*:*:*:*:*:*:*", "matchCriteriaId": "177E380A-583E-47C9-A61B-0632AB818546", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6135:-:*:*:*:*:*:*:*", "matchCriteriaId": "C90CD8FE-34D6-47C2-A8DF-4F7DA45FA175", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E3AF74E-C719-4E55-959D-681174FFFB90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6137:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EBEC892-404C-4749-91DC-F36A92EA2298", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*", "matchCriteriaId": "E290F38C-7A86-469D-9E6A-F0EC69DBE23A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EF77397-85D0-4EC2-9887-2D0D9D253450", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E9761E8-7978-4141-94B5-EEFE7C00BC9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A003F1FD-33A0-40B8-B2DC-75B5DB62B2C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*", "matchCriteriaId": "E921DEBA-3063-4639-9823-2FDDD8DEA793", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FCC81D7-E2EA-439C-9844-3C35C83549FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF44A7C9-834B-49DF-B1B6-B1575473179B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*", "matchCriteriaId": "5983B72F-9194-47CB-B444-2ECC6360B686", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6142m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2F1CD58-8C5C-479D-95ED-51A041D2D1B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6143:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DB8F2BC-431E-4DF6-8502-BBE0FD4C8166", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C7CDA3-7C4D-4884-BF36-A8EB2C80C6B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E0E40BC-5745-4AB0-B991-61A0C63DB284", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E207648-E57F-4C43-8FDD-049BF9214664", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*", "matchCriteriaId": "39EB131A-87DE-45FB-9025-B02EC28C4304", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AF30717-CBEF-42F9-AE0D-4F6A1877EA55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99D0351-303B-4ABF-A7FD-734176095307", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B080431-626C-4A7B-AB37-47EE6811A5A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6162:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4BF0B1-ABE6-4019-9396-E75063D098B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*", "matchCriteriaId": "76D48CFC-1322-4C53-8B53-88E7ACC724BE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F6456D0-32AE-44A9-9F63-AD64B5E49182", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "38EA99F9-22C2-47ED-9DDD-928E19C4C51E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F8867B2-F297-4D30-AD43-77B0F67FAE3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6222:-:*:*:*:*:*:*:*", "matchCriteriaId": "00867832-F93B-48CE-BA4B-FBC6030E8581", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*", "matchCriteriaId": "178345A5-9A38-4C8F-B3BB-430276FA4998", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*", "matchCriteriaId": "831A7D63-4638-480C-94CB-ED06613BA75C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*", "matchCriteriaId": "178D9E36-79EC-4672-8E46-0FD6597CA1CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*", "matchCriteriaId": "EED0D492-ADAB-41ED-A283-024D3CED441F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BBB5A97-EA4F-454C-819C-DE1CE7018E7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9733E69-E7CF-444C-B72C-AC8E5DEF2449", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FD24563-9157-4DE1-95ED-D4E3E879219E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*", "matchCriteriaId": "F83F8602-6679-4B3C-BBDD-3BDB2B317F70", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CD3E45C-1943-42BA-9F6D-EA64D67BF954", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF7B4C84-1258-4F2F-B8A3-55353B3D13BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E21977E-7085-46C5-8E89-F952C2EBCE04", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB72D13B-5880-4CB2-8E80-CB6A39B5A302", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*", "matchCriteriaId": "02BCB7D2-4B68-4FF8-BFC9-06C39A708C62", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAF31FBF-20FB-4B8A-ADE1-E29BB8B8A702", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C8292CC-DACB-489A-BCB2-73DC2C6F944C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D83AEDF-2671-4278-8088-BA517192AB3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF72F37A-2F28-40E6-A84B-0E1DF63B1812", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EAE9CE6-DA95-40B0-AE65-656FA4603D1A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*", "matchCriteriaId": "5241B3E0-F968-4B16-8BF8-191C6F7B224A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EFB52DD-5B7D-45BA-B249-A134D1B9EBD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*", "matchCriteriaId": "B82FC910-F3AB-42BF-9740-EC09F0AC179D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BAE2B11-B0F5-415F-BD6B-E285EF9C9095", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BA58EFB-7672-4902-ABC1-65217AA617AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*", "matchCriteriaId": "96E2764D-7D6A-4CE0-A628-FFE966A6462F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D66D18C-17F2-4259-B1D8-7C63797A024C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*", "matchCriteriaId": "25C8DFB5-9D8B-4370-849A-DC061910E54F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6262:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FEDE486-13BD-4798-AFA1-88400B6EAA28", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B704835-1250-44E1-923C-5DE2F4DD25D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6269y:-:*:*:*:*:*:*:*", "matchCriteriaId": "9008C216-1665-47F0-8407-7CB91BBFCE6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*", "matchCriteriaId": "9236F094-B913-43F2-B703-CE33B9CEBA0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*", "matchCriteriaId": "E45FA170-5BBD-45FC-ABDF-FF0FAE58A50E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*", "matchCriteriaId": "345FF353-FE25-41F4-97EC-FF32BE2796EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*", "matchCriteriaId": "68A9AD79-9B4B-4EE8-810B-359901C3540C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFD4F26B-8589-4BB0-8FC1-9F51E3B477F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8160h:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C355436-0E1A-402D-BC54-EC8BB5EE7D5D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8160m:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEDB5450-7B93-46C9-A112-7E2C7BEE1C58", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*", "matchCriteriaId": "19BF77DA-E159-4336-A552-B22BE437670D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*", "matchCriteriaId": "E86CCC45-270E-4760-A7E9-D39C74C00FCF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8165:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2F5BDB9-A81D-4334-9C9B-F03D897A89CE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*", "matchCriteriaId": "C105930C-D2BB-4FA1-B5D1-882D90D867C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*", "matchCriteriaId": "45227E88-ACFF-43A5-AF45-C6542A6EF681", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8170m:-:*:*:*:*:*:*:*", "matchCriteriaId": "31D59E6A-FC0A-4169-9600-9F83E82FA7E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8174:-:*:*:*:*:*:*:*", "matchCriteriaId": "25296B7F-41E8-4446-BC5D-7C17AFDC56AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA2030D-CEAF-46BF-9669-19EAD541BDB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*", "matchCriteriaId": "1612AE8A-3165-47A3-AEA8-65F4156C48BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8176m:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB0C8383-AD0D-4250-9A2E-27B05BD102B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5168E40-DF2F-4E39-8B5E-9659EBBB99A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8180m:-:*:*:*:*:*:*:*", "matchCriteriaId": "505C611B-8369-4738-8F2E-174B4BFB2A99", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*", "matchCriteriaId": "94A6DA7A-7C97-40E1-B31A-B92BB658C429", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*", "matchCriteriaId": "54AF128B-9984-4C91-B7F6-968DE376C3BE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "28B167F1-63FA-4C86-84AB-836ABF84E6E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*", "matchCriteriaId": "955420F9-3A3F-40E0-9940-DD43C5C78D62", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC4A437C-6C00-4729-91CC-D27EB3542633", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*", "matchCriteriaId": "74ED727D-B1A9-4F4B-92C7-3F00F3A80013", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2C24951-B3FA-48E6-AFAC-6CA0D2348230", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*", "matchCriteriaId": "713D5096-EF81-4B61-963D-63B56C03AE68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*", "matchCriteriaId": "185E8FBC-9EE9-472E-867B-0B0DEEECA13E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB3C00A0-C28A-46EB-853D-DAE3819399D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*", "matchCriteriaId": "0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0CAB607-87B2-49F4-9FAB-662D5EA3D11C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*", "matchCriteriaId": "D89A5F91-2F18-49FA-82B4-0437414751F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBC93757-5FD7-403D-B5ED-CC8793002352", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DF8D8C4-29EA-4D09-87AB-A570403BA0E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*", "matchCriteriaId": "89421EC5-52E5-441F-AD3B-5C5E964F836D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4106h:-:*:*:*:*:*:*:*", "matchCriteriaId": "596227C5-FCB2-4849-8E2B-CA737E40523A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*", "matchCriteriaId": "2117880B-FDD4-4A90-B29B-6D840D26645D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8EED1D9-75CC-41E9-9C0C-C648E0717024", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDB43A67-9DD7-49E6-BA77-220120C90700", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3413CB-86D3-4684-B651-DBACC0660E76", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB677676-E793-4158-BF53-3F5ECCECE203", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F32E6092-1AF6-499F-B176-F575E766E8F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*", "matchCriteriaId": "E524AFD4-2D9F-4A4B-82F4-13BCDE99041E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*", "matchCriteriaId": "39F309BC-6F31-490C-982B-14F9319276F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4123:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F21C6F6-70B1-49AA-8BCB-49001AF3D3C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA909754-B60A-4B30-AF42-4C8734E155AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBEFB056-0872-434B-9630-28A1AAEAD470", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*", "matchCriteriaId": "21A62CB9-FB01-45CB-9E10-E72D87C0E1F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD8EBFCC-AD76-4285-93BD-D14219C6EA5D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FF7E334-6DC7-44B5-A102-649A68300C80", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1B4F7FE-61A3-417A-BAA9-E686A76F3A94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DE4C87E-CB23-4804-9BBD-2533C5E1D6D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*", "matchCriteriaId": "7305838B-84CA-4BB8-A350-B2D2844F1041", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*", "matchCriteriaId": "D356D196-8AB0-4387-A644-C5E68174A60C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*", "matchCriteriaId": "89587A92-6234-40C3-83DB-F72319FFBC79", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*", "matchCriteriaId": "853DE44A-84C9-4959-865F-D538DF895647", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*", "matchCriteriaId": "13326C69-C160-482F-BF28-5425B57BE738", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07040D2-2ADC-4CC4-860F-74A7C64FD6FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F66D2E5-BD5B-406D-82A0-4E1E32EDC337", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*", "matchCriteriaId": "557E240A-6760-434E-9C3A-1E5E9129912D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D196C46-0F17-4C42-A232-B12CE85D9641", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B7565F3-5D41-4A1F-948B-1A55E3AD3EF8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3B40170-C992-4386-8429-52A216F64384", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*", "matchCriteriaId": "C71A52C1-1FBF-4730-8234-700F87D5E74D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9219B34E-F94C-4ECA-85E5-850EBD0F41A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCD02FD9-8E63-4B79-8878-07C4316981C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DF260A0-CDD8-4EE1-B3F4-73CD02FDCD11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B84F7DC-EE67-4748-8AE2-7070A6F79BAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C156433-48A3-4B2E-A8DB-AF1F09B2EFA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D78A1CFF-F05E-429C-A9AA-935078574A3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE28AD41-2287-4F2B-924C-30B66A320443", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*", "matchCriteriaId": "E31FFECA-F663-4B59-9800-1C6A8BD84626", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3F194D4-9425-470E-B812-CD92B5C5A68A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E426811-F97D-42CE-B06D-41CDA84E1B55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F5F5950-C21F-4142-BA1E-E074FAF249F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2BC8A89-4CF3-473B-9251-9FA5FF8ADBD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*", "matchCriteriaId": "30EE6B10-84FC-4D9D-8F39-4B7000CC85AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AFDA5D5-F00F-40CC-B492-C433200A491C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2102:-:*:*:*:*:*:*:*", "matchCriteriaId": "29F34489-E85D-4C91-9F3D-22FD83852925", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2104:-:*:*:*:*:*:*:*", "matchCriteriaId": "0453A60C-2B10-4232-B01E-23271885AD21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BA7061E-E26C-4905-AB41-18267DD32821", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AFC055D-B249-4EB4-8A9F-BE4391A27505", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6F5DF76-FC10-4562-9AD9-6675F3D6CF3C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F91FC3-CF90-450D-9E71-4A301A997921", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*", "matchCriteriaId": "739731E7-F1BF-4D12-B103-E7F85B35307E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1C36BE-D4DC-4965-8106-EDA77BDB64DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*", "matchCriteriaId": "15B85362-44E5-4107-AC8A-29DEE2A7EEDD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*", "matchCriteriaId": "63293B85-A014-4F23-97EE-6CE3467FCB06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*", "matchCriteriaId": "708D6E00-A2E5-4B08-88E7-C872ACFC341D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD8EE0E-2BA3-49DD-91D1-81AB67F16475", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC75E5CF-4241-45A8-AD45-1F7F077CEEA1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*", "matchCriteriaId": "D132291B-AADD-49E3-ADD6-333E1F1D8DFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ADF328B-D286-4C36-9F21-11A58D55D03A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6D23470-A702-426D-A63C-4F7BAC158762", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*", "matchCriteriaId": "750A77C5-1367-4E04-9ABF-1AB2D46C29C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1340A29-3428-4FAD-AA07-7F625915E34D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E50CC669-9555-45E9-A43B-05A21FB040E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADA1FA19-A836-4D6A-8C2D-718ECE6866D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ECEBDB0-2E0A-416B-9737-82C1FC65A06C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*", "matchCriteriaId": "C39B6A99-7060-4011-8FA3-E5ABE5C02813", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF9E723E-1095-424E-A90D-380CA0D2795E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*", "matchCriteriaId": "35380FB9-90FF-405F-8E2E-01C1DD209540", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*", "matchCriteriaId": "2215D655-0EA9-4530-AB68-7B1C7360D692", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*", "matchCriteriaId": "020B6FED-EAE2-478C-8FF4-CB75F24E9A9D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE519C62-F5BB-461C-91EF-2979CD506C63", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*", "matchCriteriaId": "F693457C-3529-4E62-A672-1B862F235D0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:aff_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "57C62B5F-85C4-4A06-BF24-3EBF79EF2783", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:e-series_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "02289A16-94BD-4E9B-A283-446450133D37", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:fas_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AAF9E0B-2024-4704-B7F7-61E976D73F09", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C61DF9A-ABDE-44A2-A060-B088428D5064", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "17C3B32E-E1F2-446A-B8AE-5F3E285BD5B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3BCF7CA-6C05-4FD5-A965-0F038F63D70A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "480C5657-5C05-40F5-B76A-E67119727ED8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6422BF3-01B7-443B-BD2B-80E45D7C3F5F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "696F47E6-C1CA-4A58-A91F-4B3EA92954AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76E9B752-2DA7-4182-A52E-C13F93FB2B22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEB756BB-E343-451A-866D-40B41E059705", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F712060C-ECDB-4BC7-B9B9-468B41DE615B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D511C170-65E5-416D-B7CE-557A503F25AE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "577C19F5-82ED-46DF-91CC-A074DE99EBDD", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "CEF4592C-5DB3-45F4-B354-59701BBA0C08", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87F0538B-ED6E-40C7-9C2A-4C5DC3D2935E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_cpu_1518-4_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D6FF0D64-2966-4860-8474-DFAC45E5854B", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_cpu_1518-4:-:*:*:*:*:*:*:*", "matchCriteriaId": "0376EB87-9B2F-4F04-ABB9-589C03F0591D", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Una inicializaci\u00f3n inapropiada en el firmware de algunos Intel\u00ae Processors puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local" } ], "id": "CVE-2020-12357", "lastModified": "2024-11-21T04:59:34.130", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-09T19:15:08.590", "references": [ { "source": "secure@intel.com", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210702-0002/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210702-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-665" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-09 19:15
Modified
2024-11-21 05:39
Severity ?
Summary
Race condition in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:intel:bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "F44332FD-46C6-4E7A-B400-7B93D179CD49", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3-l13g4:-:*:*:*:*:*:*:*", "matchCriteriaId": "39FD6F9C-FEEA-4D52-8745-6477B50AFB0C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5-l16g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "9A4FD69F-FF53-43F4-97C8-40867DB67958", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10510u:-:*:*:*:*:*:*:*", "matchCriteriaId": "494A828B-F2BF-40CA-AAFB-7D2AF2BAF3AA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10510y:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD97F84B-ED73-4FFD-8634-10631FEE03EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1060g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "B6CDC1BE-6A64-425C-AF2C-7DFB28FB604A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1060ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BC3C45C-FACC-4890-992F-449DF6F06E11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10610u:-:*:*:*:*:*:*:*", "matchCriteriaId": "D974FFFD-BBCC-444C-9EF1-AE478EEDB6E2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1065g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "2243674B-E505-4FED-B063-953A1569EA30", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1068ng7:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA08C262-414E-401A-8F91-131626FA82A5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1978F85-5BA5-468E-B797-7FA7EB4F489D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700e:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8D3D0CA-C981-4091-99F9-203DA8F156F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700f:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EB23D0C-D2BC-4E7F-94AF-CAF171A64307", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CC9312B-40A7-4D4A-A61C-3BA865C29F63", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "7EBECBE5-2BF0-4175-81CC-C6D054C819B2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB33CC4F-9D51-4A11-B063-6E78F0D71555", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10700te:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7092B8E-DD3F-440D-B2AA-F0E5FC4A9725", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10710u:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA491401-C484-4F77-ABF8-D389C94BF7B7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "66F8B600-B618-48E1-81EE-14A8A843F09F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10810u:-:*:*:*:*:*:*:*", "matchCriteriaId": "42ADD367-82C8-4761-AEBA-A0200C5D1CEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "4AF75C0E-BA48-4C56-8398-109D06B5A5D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10870h:-:*:*:*:*:*:*:*", "matchCriteriaId": "25329A6F-9D49-4EA7-B9FB-8C2FA5343475", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-10875h:-:*:*:*:*:*:*:*", "matchCriteriaId": "22921B65-513F-4ACE-80A2-4A31199BB5EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:*", "matchCriteriaId": "63719B1D-5A98-44E3-80D8-CF0B4C1C6F80", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5365D3B-1B0B-416D-ACFB-23843FD25EAF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D8F5409D-23C7-4CA9-951C-8EEEAE31DFDE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "5601E40A-96E1-4321-9682-055A1C607488", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF36D9CC-2FD8-4D08-8712-E625D4754613", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700b:-:*:*:*:*:*:*:*", "matchCriteriaId": "56A59A0C-91F2-4AE7-AF60-D98059542438", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:*", "matchCriteriaId": "3252CF19-9D1D-4A46-9C94-0E7255CDDD8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "E11C7F38-3313-4F6D-9D5D-E61C89E716B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:*", "matchCriteriaId": "70B0C976-3B68-4647-909A-5D574D711C7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA18192E-7DBB-45BB-8568-CA7159AF8CE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2FDB568-5340-4DD8-B933-1CD64C370BD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "D28DF93B-E15D-47D3-B9C0-4AEE8B7FADD0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "78F2DD1D-DB6F-44D1-BE3B-C798C09CC5F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "12ADA9A2-6E64-4F17-B369-816639F0D3BF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:*", "matchCriteriaId": "514B7B5E-D60D-464A-8CB0-273044FD2E09", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:*", "matchCriteriaId": "AFB608EE-83AF-4192-93E1-7DDBA5F6A54C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:*", "matchCriteriaId": "B807B5D8-BCDB-4398-8ADC-DBD1BD8D2B88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6498du:-:*:*:*:*:*:*:*", "matchCriteriaId": "9BE4BE78-2A6E-463C-A7A9-D1C8FE20A984", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6CAD248D-0B95-4BE1-917F-E0976447927D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5726D5D4-F188-4F06-B78A-2C7C694A40E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6567u:-:*:*:*:*:*:*:*", "matchCriteriaId": "72467515-7793-479B-BABF-839275CA9AAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "56B79264-C756-408C-A32A-BFD4AA0B20CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D3DB891-40F6-4000-BEAE-A1710C70C43D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6660u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3EA33F-D137-4B24-9211-C8A62A7427A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "86FFF97C-C121-4F91-B62F-057356B0A048", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "213B09CA-91E9-4D11-AA11-B84F40495E9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAFC55E4-D84D-4588-976D-1E2637B1BF0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "DCB20762-51C5-44DD-9CEE-FEEC1E9C0E5A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6700te:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAC1A189-D822-405B-A090-B1573FE12B14", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6770hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "31C57E58-66E3-4FEC-A88F-B82C4B372B2B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6785r:-:*:*:*:*:*:*:*", "matchCriteriaId": "1A0BDFFB-638F-4FB7-A43A-812874D8774A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6820eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "C173CF7E-81DF-4AD5-AB17-A4C330B933D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6820hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "638549EC-1BB1-4206-B8DC-C0101BBEF8A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6820hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8F450DA-5FBA-47BB-9A7D-75873FB3E69F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6822eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "112701D9-7154-46E5-BF36-EE36A607C7DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6870hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "87B5258B-26E4-4853-9F27-4BB12886CC38", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6920hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "9B1B04E8-A31F-4027-8E05-5461E7855F04", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-6970hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "49BDD476-E402-408D-9BD6-886AB195704D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7500u:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D566CFB-935B-40E4-9F4E-6216A42E7EBA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7560u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A97ED15-D0C6-4B64-BA08-EE50A6990272", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7567u:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6A121D8-0D01-4AA7-A1D9-5E2B9F0D30A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7600u:-:*:*:*:*:*:*:*", "matchCriteriaId": "6D57834B-C031-4301-9839-7A32F13687EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7660u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CEE126ED-B743-4C6D-95FF-04F473A9A008", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700:-:*:*:*:*:*:*:*", "matchCriteriaId": "4D901944-8E2B-41E5-BB82-CF1C97064711", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A13E353-0063-468B-96CD-97BF91C747C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "913BBEFF-49E7-42AF-A850-B49E5A12AB98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "2FE6AE98-E4D9-4FBF-B90A-2B170A0AF26F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7820eq:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8C1205B-6AC7-4DB5-B247-2108511D9957", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7820hk:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA47107D-237A-4184-8BA2-601660F7FB5C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7820hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9862E49-124E-4B7D-941A-CFD2668B6481", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7920hq:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE6572E2-5B24-4E21-9F6F-3A7A17A9F098", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-7y75:-:*:*:*:*:*:*:*", "matchCriteriaId": "85C7AD56-CA31-4C08-A5C1-B50E767E1FFD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8086k:-:*:*:*:*:*:*:*", "matchCriteriaId": "0304CBDA-AF3E-4F32-BF45-FD2199D1E025", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8500y:-:*:*:*:*:*:*:*", "matchCriteriaId": "957F3AC9-D071-4932-B2C9-1643FB78BC7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8550u:-:*:*:*:*:*:*:*", "matchCriteriaId": "1395788D-E23B-433A-B111-745C55018C68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8557u:-:*:*:*:*:*:*:*", "matchCriteriaId": "05EA3461-021B-42CD-B4BD-4D2E8703DB93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8559u:-:*:*:*:*:*:*:*", "matchCriteriaId": "CB6774C8-431B-42AC-8955-02B529222372", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8565u:-:*:*:*:*:*:*:*", "matchCriteriaId": "F41025AC-6EFE-4562-B1D1-BAB004875B06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8569u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC1ED81E-3D62-47FB-8FD4-B2732525C33C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8650u:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC82E058-25FE-4B6C-BA3C-AB043CFAB113", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8665u:-:*:*:*:*:*:*:*", "matchCriteriaId": "34DD3CCB-91D5-48D6-80BC-CA643385BCE4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8665ue:-:*:*:*:*:*:*:*", "matchCriteriaId": "41EB643A-7C3B-4017-A12C-FB48A4F6D9EF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700:-:*:*:*:*:*:*:*", "matchCriteriaId": "04076FFA-D74F-4501-9921-D8EBDF97CD20", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700b:-:*:*:*:*:*:*:*", "matchCriteriaId": "A4440FC7-F90C-44E0-B7FB-C88BC95EAB77", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700k:-:*:*:*:*:*:*:*", "matchCriteriaId": "B8846D3C-39C6-48BE-9643-ACC479416257", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8700t:-:*:*:*:*:*:*:*", "matchCriteriaId": "07279DDB-B07D-4224-AA1C-24B4F3D63BB8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8705g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4DDEFAF-EEC8-441D-82EF-ECF20B9496A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8706g:-:*:*:*:*:*:*:*", "matchCriteriaId": "F423BBE6-327A-40DC-8BCE-BF43600A68D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8709g:-:*:*:*:*:*:*:*", "matchCriteriaId": "08718840-D468-4E86-8FFF-A2B1841E6BF6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8750h:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9B77426-B579-43C6-9340-F291138ECD7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8809g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD0CF1E4-487A-4C61-AF4E-733D7ECBCFCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7-8850h:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE776B91-9E25-48F5-A4F0-EB36B704AEBB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*", "matchCriteriaId": "B93E897C-5D7B-4532-99D9-53192A1F776A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*", "matchCriteriaId": "33D0D618-D738-47F5-B7F7-C7F07972C893", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*", "matchCriteriaId": "C7A147E8-0778-49CE-92EF-ED1950138528", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*", "matchCriteriaId": "7DFC6D19-9E02-4DE5-818F-931779A41F74", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3104:-:*:*:*:*:*:*:*", "matchCriteriaId": "5DB488DD-D97C-4E21-A055-E6CECBBBC34E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3106:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DC12C97-9966-40E2-8B23-B4453EC9EA6A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3204:-:*:*:*:*:*:*:*", "matchCriteriaId": "E687CADE-6E49-4284-BD41-6CA2FDD846FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_bronze_3206r:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A7540F0-7EB8-4F64-AA31-9AF3D79BEC46", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:*", "matchCriteriaId": "404409CA-326B-425D-A4E5-1A3C8CC45344", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA5E65D0-6DB9-41D2-9721-8F1232D8155F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:*", "matchCriteriaId": "46066C5B-DB48-4B83-9E5E-3809D3F7FED2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:*", "matchCriteriaId": "E4BAE58B-C0D2-466A-88C1-47D2A81E9D7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99D4F6F-5874-4F5D-91FD-E265DCE86667", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1524n:-:*:*:*:*:*:*:*", "matchCriteriaId": "41C10BFB-B05A-48FB-86FB-6AF40EB1D6A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:*", "matchCriteriaId": "47DB082B-E169-4BE0-81DC-B2A7219C4DA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FA0A03C-21BB-4C5D-85B3-FF579F34E82C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD387ADD-02CA-4154-BF86-0DBE664FE5F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAB6FBF0-14B5-4DDC-BEC2-16535679B0C7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:*", "matchCriteriaId": "74F2A5C9-C593-4C42-A47E-F563C4696137", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:*", "matchCriteriaId": "EA7576BD-43FE-44D2-A665-F78BDA4D964D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:*", "matchCriteriaId": "EDA12CAD-F622-4F14-8847-AFD8DC250B40", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA062554-DBBC-4215-9705-1ADA545B5887", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCCDD79D-80C4-4A52-94F6-F30237AE0C53", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC6E2595-D9E7-46D6-99C8-336DEB1B4020", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:*", "matchCriteriaId": "829702E9-C0EB-4E4B-A979-41A2235B182B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:*", "matchCriteriaId": "5A84814F-B070-45B0-ABC2-1BAAA212EFD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:*", "matchCriteriaId": "C9BD8917-5BEA-491C-B6E8-486FF957A876", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:*", "matchCriteriaId": "B897D23E-1BC1-4FBB-AD00-422413C1749C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1563n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E72D84C-664A-4B7B-B828-DACCE31E1FEA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5C50FBC-6933-4E98-82B9-A70B1C836ED8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F8AD4D2-D48B-4F53-A0BA-A90E5A970832", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1573n:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA1AE789-788D-4B70-9C33-60C534878A8F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*", "matchCriteriaId": "971C6442-6546-440B-AD74-44A5BB527D11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1581:-:*:*:*:*:*:*:*", "matchCriteriaId": "4214A94D-84A3-48F2-961E-540093F22CE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1587:-:*:*:*:*:*:*:*", "matchCriteriaId": "B317C5AB-ED48-4515-AF96-970C0451E9CE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1602:-:*:*:*:*:*:*:*", "matchCriteriaId": "1F4B6C48-261B-4B0E-BA2A-7E3060D01F93", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1612:-:*:*:*:*:*:*:*", "matchCriteriaId": "66D3FEA4-8C82-44FD-9684-825BEA6DE341", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1622:-:*:*:*:*:*:*:*", "matchCriteriaId": "41FC8B26-7611-45B6-A37D-DF7025E2E92D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:*", "matchCriteriaId": "543DB437-425F-4FF7-BDBD-FB5CC17E0056", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:*", "matchCriteriaId": "97E8DD28-EC33-489F-A71C-2AEACFB16FC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1632:-:*:*:*:*:*:*:*", "matchCriteriaId": "73D0A930-AC45-48E6-9E79-90079C3EC88C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:*", "matchCriteriaId": "84B97F2B-A3D1-48A3-9FB7-755191FDD720", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:*", "matchCriteriaId": "10FD9FEF-2186-4416-93B7-B743657412A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:*", "matchCriteriaId": "38161238-5D40-485F-B0D2-D7621EC317D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-1653n:-:*:*:*:*:*:*:*", "matchCriteriaId": "0BE4E4AC-4E1D-4F86-A8E8-8053EE1B974E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:*", "matchCriteriaId": "B804174C-53DB-4641-BD26-3ECDD9FBD638", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FB59E56-9FBE-4D10-AFC0-03E0ED0A4120", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:*", "matchCriteriaId": "B3930A6D-64DC-4953-AD7E-EED0C48B048E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:*", "matchCriteriaId": "2B10FCF1-F496-4166-9162-41012C4D2B16", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "ACAAD0F0-9182-46EF-8399-C04FB472BE6F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "FCADFB25-DCBB-4901-9E4D-132ED49C7F26", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:*", "matchCriteriaId": "F0327393-DB2A-455B-8E20-3EDB3766CDA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2E00698-8A08-433F-8852-8EDC422A53D8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "2A25BD7C-F01B-49F6-8DB0-2F8B976AC9E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:*", "matchCriteriaId": "4925D0EA-D524-432F-8417-892BB8C3DDFA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "F3757F7B-4283-4ABF-974B-59E4E2358035", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:*", "matchCriteriaId": "93D86199-5CF3-4E7A-8295-50F958EA4B4C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*", "matchCriteriaId": "122BD094-E815-4081-B674-B71AC193BE0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_d-2191:-:*:*:*:*:*:*:*", "matchCriteriaId": "14DFFCEF-09F5-4228-AB7F-F042C4D5CE2A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2104g:-:*:*:*:*:*:*:*", "matchCriteriaId": "921B163F-7696-4C47-8FD5-1E2897471C22", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2124:-:*:*:*:*:*:*:*", "matchCriteriaId": "43126A13-5931-4989-BEFD-E1A096F98D94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2124g:-:*:*:*:*:*:*:*", "matchCriteriaId": "342E0783-288A-4DB0-A657-29937903927C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2126g:-:*:*:*:*:*:*:*", "matchCriteriaId": "D4C40F91-138F-4396-9A6B-B969F6AC30B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2134:-:*:*:*:*:*:*:*", "matchCriteriaId": "23CA9365-B1C4-4188-A9BF-19215AFF58A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2136:-:*:*:*:*:*:*:*", "matchCriteriaId": "C4797D2E-1270-447B-BFE4-CC96D9F10D5B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2144g:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CA77EB3-6F11-43BC-8B59-84217AA73205", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2146g:-:*:*:*:*:*:*:*", "matchCriteriaId": "0866F1A3-8B9C-4B5A-B30D-71B3465EC80A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2174g:-:*:*:*:*:*:*:*", "matchCriteriaId": "331B8F10-3A20-46A8-B960-3546271CF701", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2176g:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE638E59-DF75-43B1-A6DC-10A838B05B00", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2176m:-:*:*:*:*:*:*:*", "matchCriteriaId": "109FA97C-10EE-41F9-B52B-B37E31642251", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2186g:-:*:*:*:*:*:*:*", "matchCriteriaId": "A67B3834-E59E-47AF-A806-13A990E812B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2186m:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDA04EFF-A9A0-4900-A2F8-7C0D346ACF6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2224:-:*:*:*:*:*:*:*", "matchCriteriaId": "79214F8B-1090-4DCD-B1F4-0FF78FC29C4A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2224g:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD176FB0-7427-4F2E-A969-72062BB3EF98", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2226g:-:*:*:*:*:*:*:*", "matchCriteriaId": "B278081F-F900-4581-9D10-B5A2ACD2E2C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2226ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBBDAA3E-960B-4E84-AD3F-2F8B3A4FF903", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2234:-:*:*:*:*:*:*:*", "matchCriteriaId": "45689B37-5085-41B3-BA9D-F05FD07DF1FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2236:-:*:*:*:*:*:*:*", "matchCriteriaId": "A7186EA5-448F-473A-8FC8-058FC823ACC5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2244g:-:*:*:*:*:*:*:*", "matchCriteriaId": "C12F0C71-8F25-4C77-A3F3-1231AC53C0CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2246g:-:*:*:*:*:*:*:*", "matchCriteriaId": "EB179A6F-FED8-45FB-89C7-3B17D6F5EB21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2254me:-:*:*:*:*:*:*:*", "matchCriteriaId": "F58AEEB9-919B-4C6C-83B6-080846786A56", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2254ml:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0BAE174-A158-4807-9D67-36F795028D76", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2274g:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAD38AEA-979D-484B-82F0-0161BA39E9F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276g:-:*:*:*:*:*:*:*", "matchCriteriaId": "780AB9F4-0C87-4528-B53A-69FBC4D87ADB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276m:-:*:*:*:*:*:*:*", "matchCriteriaId": "E5AA7BB1-6131-4206-8F99-BA8DCE60BFC7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276me:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2CA54AE-915F-45B9-B775-C04589E49802", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2276ml:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB86F018-1F56-4146-A78E-C7BF7B616023", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2278g:-:*:*:*:*:*:*:*", "matchCriteriaId": "63650DBF-4DBD-4655-AE93-5CBE53F8E0FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2278ge:-:*:*:*:*:*:*:*", "matchCriteriaId": "00912C9C-D386-445E-B390-E96361ECDFA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2278gel:-:*:*:*:*:*:*:*", "matchCriteriaId": "60B582A1-784C-4BE8-A0D5-706DE01D769E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2286g:-:*:*:*:*:*:*:*", "matchCriteriaId": "320597E9-6A2B-47E6-A33C-6B31A81902EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2286m:-:*:*:*:*:*:*:*", "matchCriteriaId": "556637E1-9502-41E7-B91D-082C92F233A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e-2288g:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EA930BC-EF68-4AD5-AA1B-0659358028D5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1205_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "03469EB3-138B-46EA-97CE-4386F6A16B33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1220_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4E629CF7-A706-4DD3-B3EB-A1F9711B0372", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1220_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "EFD11A3F-A2D4-4B09-84D2-548F97268805", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1225_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1BCDBDF-A902-43A8-94A8-13541FB8CB32", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1225_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8E031BE7-87C6-4E4B-8988-020221ECAEE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1230_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "1CC1EDA9-6CB8-4643-AC65-76B892319879", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1230_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "49C57129-0A27-4142-BF6E-68A558773573", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1235l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "15DB4F8D-E42C-4119-83BD-44D6AB9319B0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "51E0227B-8F2B-48B3-97BC-73BA1BACEED8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5EFEF14-4ECB-45C9-8911-01FD7B115D7B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1240l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "C8BD1F0B-7B75-4A5A-A708-BDE56D237354", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1245_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE01A935-4048-4578-8FBA-1D12A95654D1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1245_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "333364EE-BF57-4217-9517-2C1B95B826CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1260l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D45FCBB-CC03-40A8-ADCE-7AE0A7AA05A4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1268l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "28D7D164-E631-4D49-B87A-0B7885148790", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1270_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA74EB5E-3D7D-4E5A-8D7D-AF902F8BCF8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1270_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F2476F2-6A8B-442F-B054-738F36613CE2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1275_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "F2A10975-3375-4FB3-A008-56EB2ACD2737", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1275_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BC9CEA2-C621-4DCF-B64C-5495D3208DB4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1280_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "E6A99895-6A48-4A44-B0F7-7BED55C677FC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1280_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "A32F3CD6-6BA6-40E7-9580-3C1A455B3C99", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1285_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "C2559D24-F8AD-4202-A00D-F48D51A0940A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1501l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "37AF4F98-0672-4101-9825-57B0F64EDBEE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1501m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "2231374F-222A-4BA3-B14D-F69860668F7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "057E3667-7BA8-4142-8A1E-B957333D776A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505l_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "31BF874F-B640-4A18-AC92-F0E16AB7E1C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "84A77114-92C8-48C4-9D12-3ACC3030D5A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1505m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "542BC61B-1EA3-4C42-BB99-C9C67EE82F7D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1515m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "13B5BF22-5E95-46A4-AF05-450CFD1312C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "9490F926-AD57-40F3-A523-61D67486DCB0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1535m_v6:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA12E60-4B0A-4723-8A02-3115494CD1DE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1545m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "29CC9B92-CF59-4121-9638-F4D4521952D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1558l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CC6592D-743B-4656-B1C0-247F36ABE5CA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1565l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "BCC32129-C5DC-4D26-96D5-219F5291D6F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1575m_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "81F4426C-970C-49DB-950B-3F5ED17E682A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1578l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "4ADED698-2702-479C-A24E-E9E6F35E9AFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1585_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "D86C0CFB-72A3-4446-9601-2C956C9A71F4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e3-1585l_v5:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3C578D9-8973-4F36-8BA4-9F4F3A8E0AE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1428l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "08DE8D7C-5C1B-41AE-B188-4EB1F6D6A73D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1603_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "536623D6-4032-45AC-8A5B-9816A4CBACE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1603_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "29A9BE04-4A58-4DFB-AE83-EF21935DED9E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1607_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0BDB8F0-0FA8-440F-AE6A-5ACFDFBF0B57", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1607_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "6FF3EE79-4F71-44EC-901D-7C6DF90B0AA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E6629A2-D63B-45B5-BA50-FB5A1EEA2801", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "4FF717C4-6E91-4A86-87E4-D97F70E0936E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1630_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CF1837A-E1F1-494B-84E7-017DB5F64D6D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB2A5EA2-10A9-4C53-BD0E-1026D5F51B6E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6EB2911-50F8-4D96-83A1-BD9CC3FDDE87", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0B83717-B20B-4EF9-9750-5C628DE8DA6C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1660_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B54BEBF-3663-4D87-8F9D-6BF1A355A089", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "19A506EE-01BE-41E1-BDC9-67CA676B8638", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1680_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5577CD1E-E032-4AC2-81A6-B90DE9B4100F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE60C16D-B9F7-4EAA-B240-92202B11F6A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2408l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BDE2E5F-6B88-4766-A90D-D29C5405EAE6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2418l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C2F4E95-F636-467D-A989-E612D43A46C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2428l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E83D1C5E-B0A3-4F09-ADFE-D94C8C311889", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2438l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E99224BE-1103-4426-84AA-67434C73DF08", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2603_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC006C18-852A-4539-8D2B-98F4A28432F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB17C45E-9401-4A21-B537-0432744403AC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2608l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EF72AC7-A510-475A-BA52-C1723AB6364F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "284FF890-627A-4FAC-A8F4-A9B44E3DA397", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2609_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD7F5B03-F15E-43AC-BB9D-5112BCA4C580", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0F4E301-BF06-44E1-8F15-37FF5B31CB19", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2618l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "09991B04-44BC-4095-A7EB-D51962D212B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "522F7CBA-7480-43D8-A31A-B52872600ED2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBB8DBD2-6B19-4D44-861C-1B39D8D6849A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "396B0F7F-3BF1-49BF-9304-285049FBA318", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2623_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "95D11ED7-2F2B-4035-9B16-6217CD712671", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A28FD72F-F1CF-4076-9523-E355C20CEED8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2628l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "340988ED-D3ED-4F1A-A18E-4A8034794F46", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "F826234A-2C49-4E02-B586-5CD038A90799", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2630_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "397C37D9-C510-43F4-A71D-464EC1A30981", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC204334-6964-4DCA-A62B-BB71FFA5D4EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2630l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "672563CA-755C-4FBE-AD8C-D2347BCA94A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3833A360-9D9E-4CFE-9CAC-DC9F0CDA0C52", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2637_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F6C74009-8116-4BB4-BFA8-F76C2462DA07", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A85ED1D-D2B1-46FB-90A4-0B47EB1EED8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2640_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAD95EF4-3CE6-44B7-800D-DF6653EE1EA9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7E1EECC4-C82D-4871-A554-61A15A496E90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2643_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D1FCB01-384E-48CD-B2BA-689EE3F6392F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "209DE5F9-D191-4720-A53E-1F39BC6567DC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2648l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "B917B344-9B5D-42D6-B824-C5C9F3835F41", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "963AD924-07BB-4E68-B817-AC2A82A5C7C4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D7C0BC0-0735-4B74-BDEF-209276A1C355", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A738A2D0-FF0B-4E75-90F7-E0E39D937C5E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2650l_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "BEBA2D48-60D1-418C-8433-0159F2BBB9E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "BE67577F-3B63-4995-9E51-19647F4EBB3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2658_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "30E02D4A-975B-474D-91FD-5A000288314E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A081C35C-0D19-4025-AFDE-C3E4C4462124", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2658a_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "00380A58-37CD-46E0-8969-488F2A18DA8D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2660_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "659BCA41-19B3-4C72-A4AA-05B02B02F491", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7571BE1-C7C8-4FA4-81B3-9F0F7BED5840", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2667_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "A128BADC-97D1-4781-BDA2-31F5655EE91A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "72781DBF-E6D4-4BDB-BD6E-9B86EB0224A6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2670_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B0E8EC3-F041-4AF2-9401-A848845D691D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2679_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "1833D3EA-CD65-41D5-A9DA-018FC4245981", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2680_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "02904FD2-A03D-4332-8AC6-BA371E43D4A9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "EAC3D549-9EF3-436A-B672-693CB1D5C14B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2683_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "BA56AFF2-32F1-4153-A89F-F86C0A2479DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "DA406873-E126-402A-BBD8-46BC22AC4756", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2685_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "530D6B53-F366-455D-8528-847FD5BD5397", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2687w_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "220D6074-7F5E-4ACC-AB83-919E6B96D29D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "953C8F85-28B4-4458-A4F0-2D55336FE34C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2689_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "95F26DD7-5D32-4032-9C22-F4D0C8F7C34D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2690_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "F64B80DD-888A-41E7-939A-FD76097B62FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "BD63CDF0-0EF3-4370-9F9D-FE3DF07E39AC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2695_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "54F6F82C-1960-4178-9B50-B881C57ABA86", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "29A3A2F8-3908-4083-AB72-301A825FBD1A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2697_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "52DCEE26-2A9B-430D-9FF8-E08ECE03327F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "9203112A-2E5C-4EF5-B34F-74E66838BE3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E995666-F7F9-42AB-83DA-AE4202B59A90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2698_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D3471A8-01D0-46D6-AD28-F56D28672DDB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D0DAE24C-19F7-46CF-AC3F-E38066FCE0CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2699_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C896D1-EF28-422D-8215-504E6F22A4FD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "C830F688-BCE6-4A86-9C58-DB34505EC366", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "124DF9B2-F703-42BF-9737-1777A51D05D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-2699r_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "38224721-20BC-4E60-9D6E-AAF033C88C3A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4610_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "83311344-22A3-4F0A-B9C5-79DDD6D0575E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "C77023B4-99B8-4C36-B384-68445D28783E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4620_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2397DC1-2F80-4C14-B853-5866541C1599", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "EE8104B9-EA92-4AFB-829A-35FDF9E1FE4F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4627_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9144C66B-9838-4F13-86F0-E7CD30F1754A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "A8C3809F-F701-4969-A27A-294D0ACB9CF7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "C96C9EBB-4585-425D-81CC-9A2B0C1CF9BE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4640_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "11621F63-45AF-470B-B3DB-75D5DAB53985", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7A55CAE1-0334-469F-9230-35D607A42DA3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4648_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DE4FA80-47FC-4307-A9AD-020C8C2A8AFF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4650_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AD51E71-3AC1-4130-8FCC-847A42E54DE8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "DD7C804C-BFAA-4886-9621-C255F2F867B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4655_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "8B118810-DB63-4CBE-870E-BCDEE722F446", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC5D11E3-FEDE-4453-B89D-78505BD03326", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4660_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9AAD6DC7-50F1-4F37-AC8F-39DE1ABED619", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "160A9F6E-18A6-4181-A63C-5F8A13985869", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4667_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "9FF54142-6EBD-4460-9BA0-6D530FFC9997", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "C1420874-49D0-4E69-BD67-26E6C9FC873E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4669_v3:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2085B85-EE5E-4292-AD0B-9B83F9884EE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "EC478F61-883E-46BB-A4F9-5833A6DDE6C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-4809_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "376E792F-A029-40B1-83B6-A0C2F40F4B1C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-4820_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FECF753-354D-40EF-8063-FF93C7FA8B86", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-4830_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "97AA9A3F-9ADA-46B6-8CEE-A46564953699", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-4850_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D355937-EE3A-4FE0-B3CB-5B7E19ADE4FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-8855_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "AA4812F6-8120-4624-BAF6-2AFF8A317302", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-8860_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5B57D26-455B-48D4-BB27-6A8D84C8D5D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-8867_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "E9C950AF-E109-41ED-8A3D-F7151216F01F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-8870_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D3199C4-C5BA-4FC8-9539-21A6C3C85336", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-8880_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D830FF1B-05A2-47C3-9AA0-06F75F0CF01C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-8890_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "FD8390A9-863C-4687-BEDA-64768191E7C9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-8891_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "113A641C-D291-4BE5-9643-21BA1FB04101", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-8893_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "D5AB45CA-5D82-4204-8274-7B0CD0B5C852", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_e7-8894_v4:-:*:*:*:*:*:*:*", "matchCriteriaId": "3380FA20-4FEB-4F6D-A86D-A3BF81E8F8D3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5115:-:*:*:*:*:*:*:*", "matchCriteriaId": "DE862F15-69CC-488E-ABE8-1E23A5A1089F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5117:-:*:*:*:*:*:*:*", "matchCriteriaId": "B7DB4283-69E5-4946-B20F-5716872E0AC9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5117f:-:*:*:*:*:*:*:*", "matchCriteriaId": "FAB62E38-9339-4CD6-AA7C-6AB2036CC99B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5118:-:*:*:*:*:*:*:*", "matchCriteriaId": "9087D09E-ADCB-478A-87FD-B7113FD29EFB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5119t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B43E11E-5350-4DDB-A743-F84D4D2286D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5120:-:*:*:*:*:*:*:*", "matchCriteriaId": "5D64D1ED-A386-4475-99AB-7727DE67E1A2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5120t:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EFB4646-A5BA-4662-A47F-62407AFEDFF2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5122:-:*:*:*:*:*:*:*", "matchCriteriaId": "29A923F6-E352-4752-B7D3-007FE1CAFE06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5215:-:*:*:*:*:*:*:*", "matchCriteriaId": "8DA109ED-BC4D-4F70-81B2-3CE0E2B3D9DA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5215l:-:*:*:*:*:*:*:*", "matchCriteriaId": "070C20AB-66F2-4EE2-8134-5E40DBB9B9E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5217:-:*:*:*:*:*:*:*", "matchCriteriaId": "9CA49CF7-C6BE-4337-A0A8-A603D8955EE9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218:-:*:*:*:*:*:*:*", "matchCriteriaId": "9C8F7F6B-847A-479D-B6B1-BBA331D06DE0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218b:-:*:*:*:*:*:*:*", "matchCriteriaId": "4C375A9D-C7CE-49A6-B08D-9CAB22E16D32", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218n:-:*:*:*:*:*:*:*", "matchCriteriaId": "AF8D06DC-6B8A-4B7B-BB3E-778D432CFEF1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218r:-:*:*:*:*:*:*:*", "matchCriteriaId": "E06531E6-126A-4FBB-BEBB-F9023C4738F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5218t:-:*:*:*:*:*:*:*", "matchCriteriaId": "93B8CDF0-1489-4E4C-B004-A22E06FC10D7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5219y:-:*:*:*:*:*:*:*", "matchCriteriaId": "1236D064-3A63-4F7E-90A0-FFDB0E04E714", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5220:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6ACF161-472E-4088-85C2-5940C9C88D45", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5220r:-:*:*:*:*:*:*:*", "matchCriteriaId": "2E0B94F6-EC15-4C12-8BA5-CC6602A7A725", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5220s:-:*:*:*:*:*:*:*", "matchCriteriaId": "067C65E5-5392-4DAF-A6BD-640D78C19CE1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5220t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A1647DAC-CED6-4DAF-8F82-A42D6D691DF0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_5222:-:*:*:*:*:*:*:*", "matchCriteriaId": "D93CC498-F558-4C2F-9E14-7897060CA9FE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6122:-:*:*:*:*:*:*:*", "matchCriteriaId": "4340947E-3B48-4A0F-BCC8-C95AFC9C37B9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6126:-:*:*:*:*:*:*:*", "matchCriteriaId": "D609DB7E-AE80-48E0-B7B6-E622B6208ABF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6126f:-:*:*:*:*:*:*:*", "matchCriteriaId": "A09C3656-AE49-4F26-BD28-B725E8C40304", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6126t:-:*:*:*:*:*:*:*", "matchCriteriaId": "90F0D1EF-2FE1-498A-AE38-BF755A680E88", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6128:-:*:*:*:*:*:*:*", "matchCriteriaId": "22243DEF-F01B-4774-AEC1-40D776E1167E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6129:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC72383A-6791-4A69-9DA4-167B09739971", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6130:-:*:*:*:*:*:*:*", "matchCriteriaId": "25934425-944F-4B9A-8A16-F1DCBF3D5032", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:*", "matchCriteriaId": "6A5BC76B-A4FC-4702-A544-889E62F8509E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6130h:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F54A1FE-7563-42DD-9A8C-D3730AF63B34", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6130t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F4E44C3-D29F-4057-AE12-BA19FFFF69E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6132:-:*:*:*:*:*:*:*", "matchCriteriaId": "383DCE68-3882-4274-AA4A-5E030530E4BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6134:-:*:*:*:*:*:*:*", "matchCriteriaId": "04EC7421-963C-43F7-9450-2E204BAFF1F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6134m:-:*:*:*:*:*:*:*", "matchCriteriaId": "177E380A-583E-47C9-A61B-0632AB818546", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6135:-:*:*:*:*:*:*:*", "matchCriteriaId": "C90CD8FE-34D6-47C2-A8DF-4F7DA45FA175", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6136:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E3AF74E-C719-4E55-959D-681174FFFB90", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6137:-:*:*:*:*:*:*:*", "matchCriteriaId": "0EBEC892-404C-4749-91DC-F36A92EA2298", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6138:-:*:*:*:*:*:*:*", "matchCriteriaId": "E290F38C-7A86-469D-9E6A-F0EC69DBE23A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6138f:-:*:*:*:*:*:*:*", "matchCriteriaId": "6EF77397-85D0-4EC2-9887-2D0D9D253450", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6138p:-:*:*:*:*:*:*:*", "matchCriteriaId": "9E9761E8-7978-4141-94B5-EEFE7C00BC9A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6138t:-:*:*:*:*:*:*:*", "matchCriteriaId": "A003F1FD-33A0-40B8-B2DC-75B5DB62B2C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6140:-:*:*:*:*:*:*:*", "matchCriteriaId": "E921DEBA-3063-4639-9823-2FDDD8DEA793", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6140m:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FCC81D7-E2EA-439C-9844-3C35C83549FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6142:-:*:*:*:*:*:*:*", "matchCriteriaId": "CF44A7C9-834B-49DF-B1B6-B1575473179B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6142f:-:*:*:*:*:*:*:*", "matchCriteriaId": "5983B72F-9194-47CB-B444-2ECC6360B686", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6142m:-:*:*:*:*:*:*:*", "matchCriteriaId": "B2F1CD58-8C5C-479D-95ED-51A041D2D1B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6143:-:*:*:*:*:*:*:*", "matchCriteriaId": "3DB8F2BC-431E-4DF6-8502-BBE0FD4C8166", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6144:-:*:*:*:*:*:*:*", "matchCriteriaId": "09C7CDA3-7C4D-4884-BF36-A8EB2C80C6B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6146:-:*:*:*:*:*:*:*", "matchCriteriaId": "5E0E40BC-5745-4AB0-B991-61A0C63DB284", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6148:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E207648-E57F-4C43-8FDD-049BF9214664", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6148f:-:*:*:*:*:*:*:*", "matchCriteriaId": "39EB131A-87DE-45FB-9025-B02EC28C4304", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6150:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AF30717-CBEF-42F9-AE0D-4F6A1877EA55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6152:-:*:*:*:*:*:*:*", "matchCriteriaId": "D99D0351-303B-4ABF-A7FD-734176095307", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6154:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B080431-626C-4A7B-AB37-47EE6811A5A0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6162:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF4BF0B1-ABE6-4019-9396-E75063D098B8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6208u:-:*:*:*:*:*:*:*", "matchCriteriaId": "76D48CFC-1322-4C53-8B53-88E7ACC724BE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6209u:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F6456D0-32AE-44A9-9F63-AD64B5E49182", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6210u:-:*:*:*:*:*:*:*", "matchCriteriaId": "38EA99F9-22C2-47ED-9DDD-928E19C4C51E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6212u:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F8867B2-F297-4D30-AD43-77B0F67FAE3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6222:-:*:*:*:*:*:*:*", "matchCriteriaId": "00867832-F93B-48CE-BA4B-FBC6030E8581", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6222v:-:*:*:*:*:*:*:*", "matchCriteriaId": "178345A5-9A38-4C8F-B3BB-430276FA4998", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6226:-:*:*:*:*:*:*:*", "matchCriteriaId": "831A7D63-4638-480C-94CB-ED06613BA75C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6226r:-:*:*:*:*:*:*:*", "matchCriteriaId": "178D9E36-79EC-4672-8E46-0FD6597CA1CC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6230:-:*:*:*:*:*:*:*", "matchCriteriaId": "EED0D492-ADAB-41ED-A283-024D3CED441F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6230n:-:*:*:*:*:*:*:*", "matchCriteriaId": "2BBB5A97-EA4F-454C-819C-DE1CE7018E7A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6230r:-:*:*:*:*:*:*:*", "matchCriteriaId": "D9733E69-E7CF-444C-B72C-AC8E5DEF2449", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6230t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0FD24563-9157-4DE1-95ED-D4E3E879219E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6234:-:*:*:*:*:*:*:*", "matchCriteriaId": "F83F8602-6679-4B3C-BBDD-3BDB2B317F70", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6238:-:*:*:*:*:*:*:*", "matchCriteriaId": "3CD3E45C-1943-42BA-9F6D-EA64D67BF954", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6238l:-:*:*:*:*:*:*:*", "matchCriteriaId": "EF7B4C84-1258-4F2F-B8A3-55353B3D13BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6238t:-:*:*:*:*:*:*:*", "matchCriteriaId": "0E21977E-7085-46C5-8E89-F952C2EBCE04", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6240:-:*:*:*:*:*:*:*", "matchCriteriaId": "DB72D13B-5880-4CB2-8E80-CB6A39B5A302", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6240l:-:*:*:*:*:*:*:*", "matchCriteriaId": "02BCB7D2-4B68-4FF8-BFC9-06C39A708C62", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6240r:-:*:*:*:*:*:*:*", "matchCriteriaId": "AAF31FBF-20FB-4B8A-ADE1-E29BB8B8A702", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6240y:-:*:*:*:*:*:*:*", "matchCriteriaId": "7BF7298E-BC07-4C42-8F9C-C3B0CDFC86C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6242:-:*:*:*:*:*:*:*", "matchCriteriaId": "0C8292CC-DACB-489A-BCB2-73DC2C6F944C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6242r:-:*:*:*:*:*:*:*", "matchCriteriaId": "2D83AEDF-2671-4278-8088-BA517192AB3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6244:-:*:*:*:*:*:*:*", "matchCriteriaId": "BF72F37A-2F28-40E6-A84B-0E1DF63B1812", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6246:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8C1742C-96CC-4BCA-928E-D6B53ED2DB0E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6246r:-:*:*:*:*:*:*:*", "matchCriteriaId": "3EAE9CE6-DA95-40B0-AE65-656FA4603D1A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6248:-:*:*:*:*:*:*:*", "matchCriteriaId": "CAD0B5C3-633D-4F2A-8D56-8FA83F1B581C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6248r:-:*:*:*:*:*:*:*", "matchCriteriaId": "5241B3E0-F968-4B16-8BF8-191C6F7B224A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6250:-:*:*:*:*:*:*:*", "matchCriteriaId": "5EFB52DD-5B7D-45BA-B249-A134D1B9EBD3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6250l:-:*:*:*:*:*:*:*", "matchCriteriaId": "B82FC910-F3AB-42BF-9740-EC09F0AC179D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6252:-:*:*:*:*:*:*:*", "matchCriteriaId": "1BAE2B11-B0F5-415F-BD6B-E285EF9C9095", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6252n:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BA58EFB-7672-4902-ABC1-65217AA617AD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6254:-:*:*:*:*:*:*:*", "matchCriteriaId": "96E2764D-7D6A-4CE0-A628-FFE966A6462F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6256:-:*:*:*:*:*:*:*", "matchCriteriaId": "1D66D18C-17F2-4259-B1D8-7C63797A024C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6258r:-:*:*:*:*:*:*:*", "matchCriteriaId": "25C8DFB5-9D8B-4370-849A-DC061910E54F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6262:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FEDE486-13BD-4798-AFA1-88400B6EAA28", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6262v:-:*:*:*:*:*:*:*", "matchCriteriaId": "0B704835-1250-44E1-923C-5DE2F4DD25D0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_gold_6269y:-:*:*:*:*:*:*:*", "matchCriteriaId": "9008C216-1665-47F0-8407-7CB91BBFCE6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8153:-:*:*:*:*:*:*:*", "matchCriteriaId": "9236F094-B913-43F2-B703-CE33B9CEBA0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8156:-:*:*:*:*:*:*:*", "matchCriteriaId": "E45FA170-5BBD-45FC-ABDF-FF0FAE58A50E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8158:-:*:*:*:*:*:*:*", "matchCriteriaId": "345FF353-FE25-41F4-97EC-FF32BE2796EA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8160:-:*:*:*:*:*:*:*", "matchCriteriaId": "68A9AD79-9B4B-4EE8-810B-359901C3540C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8160f:-:*:*:*:*:*:*:*", "matchCriteriaId": "BFD4F26B-8589-4BB0-8FC1-9F51E3B477F7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8160h:-:*:*:*:*:*:*:*", "matchCriteriaId": "6C355436-0E1A-402D-BC54-EC8BB5EE7D5D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8160m:-:*:*:*:*:*:*:*", "matchCriteriaId": "EEDB5450-7B93-46C9-A112-7E2C7BEE1C58", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8160t:-:*:*:*:*:*:*:*", "matchCriteriaId": "19BF77DA-E159-4336-A552-B22BE437670D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8164:-:*:*:*:*:*:*:*", "matchCriteriaId": "E86CCC45-270E-4760-A7E9-D39C74C00FCF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8165:-:*:*:*:*:*:*:*", "matchCriteriaId": "D2F5BDB9-A81D-4334-9C9B-F03D897A89CE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8168:-:*:*:*:*:*:*:*", "matchCriteriaId": "C105930C-D2BB-4FA1-B5D1-882D90D867C3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8170:-:*:*:*:*:*:*:*", "matchCriteriaId": "45227E88-ACFF-43A5-AF45-C6542A6EF681", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8170m:-:*:*:*:*:*:*:*", "matchCriteriaId": "31D59E6A-FC0A-4169-9600-9F83E82FA7E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8174:-:*:*:*:*:*:*:*", "matchCriteriaId": "25296B7F-41E8-4446-BC5D-7C17AFDC56AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8176:-:*:*:*:*:*:*:*", "matchCriteriaId": "5FA2030D-CEAF-46BF-9669-19EAD541BDB6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8176f:-:*:*:*:*:*:*:*", "matchCriteriaId": "1612AE8A-3165-47A3-AEA8-65F4156C48BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8176m:-:*:*:*:*:*:*:*", "matchCriteriaId": "BB0C8383-AD0D-4250-9A2E-27B05BD102B4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8180:-:*:*:*:*:*:*:*", "matchCriteriaId": "C5168E40-DF2F-4E39-8B5E-9659EBBB99A3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8180m:-:*:*:*:*:*:*:*", "matchCriteriaId": "505C611B-8369-4738-8F2E-174B4BFB2A99", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8253:-:*:*:*:*:*:*:*", "matchCriteriaId": "94A6DA7A-7C97-40E1-B31A-B92BB658C429", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8256:-:*:*:*:*:*:*:*", "matchCriteriaId": "54AF128B-9984-4C91-B7F6-968DE376C3BE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8260:-:*:*:*:*:*:*:*", "matchCriteriaId": "28B167F1-63FA-4C86-84AB-836ABF84E6E3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8260l:-:*:*:*:*:*:*:*", "matchCriteriaId": "955420F9-3A3F-40E0-9940-DD43C5C78D62", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8260y:-:*:*:*:*:*:*:*", "matchCriteriaId": "BC4A437C-6C00-4729-91CC-D27EB3542633", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8268:-:*:*:*:*:*:*:*", "matchCriteriaId": "74ED727D-B1A9-4F4B-92C7-3F00F3A80013", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8270:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2C24951-B3FA-48E6-AFAC-6CA0D2348230", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8274:-:*:*:*:*:*:*:*", "matchCriteriaId": "713D5096-EF81-4B61-963D-63B56C03AE68", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8276:-:*:*:*:*:*:*:*", "matchCriteriaId": "185E8FBC-9EE9-472E-867B-0B0DEEECA13E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8276l:-:*:*:*:*:*:*:*", "matchCriteriaId": "AB3C00A0-C28A-46EB-853D-DAE3819399D9", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8280:-:*:*:*:*:*:*:*", "matchCriteriaId": "0951DB50-AC8E-4C17-A2A9-DD4A198C4DD2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8280l:-:*:*:*:*:*:*:*", "matchCriteriaId": "E0CAB607-87B2-49F4-9FAB-662D5EA3D11C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_8284:-:*:*:*:*:*:*:*", "matchCriteriaId": "D89A5F91-2F18-49FA-82B4-0437414751F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_9221:-:*:*:*:*:*:*:*", "matchCriteriaId": "DBC93757-5FD7-403D-B5ED-CC8793002352", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_9222:-:*:*:*:*:*:*:*", "matchCriteriaId": "0A7019D4-58E0-4B73-93B8-D3B0E86BF2D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_9242:-:*:*:*:*:*:*:*", "matchCriteriaId": "6DF8D8C4-29EA-4D09-87AB-A570403BA0E6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_platinum_9282:-:*:*:*:*:*:*:*", "matchCriteriaId": "89421EC5-52E5-441F-AD3B-5C5E964F836D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4106h:-:*:*:*:*:*:*:*", "matchCriteriaId": "596227C5-FCB2-4849-8E2B-CA737E40523A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4108:-:*:*:*:*:*:*:*", "matchCriteriaId": "2117880B-FDD4-4A90-B29B-6D840D26645D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4109t:-:*:*:*:*:*:*:*", "matchCriteriaId": "E8EED1D9-75CC-41E9-9C0C-C648E0717024", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4110:-:*:*:*:*:*:*:*", "matchCriteriaId": "BDB43A67-9DD7-49E6-BA77-220120C90700", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4112:-:*:*:*:*:*:*:*", "matchCriteriaId": "0D3413CB-86D3-4684-B651-DBACC0660E76", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4114:-:*:*:*:*:*:*:*", "matchCriteriaId": "FB677676-E793-4158-BF53-3F5ECCECE203", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4114t:-:*:*:*:*:*:*:*", "matchCriteriaId": "F32E6092-1AF6-499F-B176-F575E766E8F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4116:-:*:*:*:*:*:*:*", "matchCriteriaId": "E524AFD4-2D9F-4A4B-82F4-13BCDE99041E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4116t:-:*:*:*:*:*:*:*", "matchCriteriaId": "39F309BC-6F31-490C-982B-14F9319276F2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4123:-:*:*:*:*:*:*:*", "matchCriteriaId": "7F21C6F6-70B1-49AA-8BCB-49001AF3D3C1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4208:-:*:*:*:*:*:*:*", "matchCriteriaId": "FA909754-B60A-4B30-AF42-4C8734E155AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4209t:-:*:*:*:*:*:*:*", "matchCriteriaId": "EBEFB056-0872-434B-9630-28A1AAEAD470", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4210:-:*:*:*:*:*:*:*", "matchCriteriaId": "21A62CB9-FB01-45CB-9E10-E72D87C0E1F1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4210r:-:*:*:*:*:*:*:*", "matchCriteriaId": "CD8EBFCC-AD76-4285-93BD-D14219C6EA5D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4210t:-:*:*:*:*:*:*:*", "matchCriteriaId": "7FF7E334-6DC7-44B5-A102-649A68300C80", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4214:-:*:*:*:*:*:*:*", "matchCriteriaId": "E1B4F7FE-61A3-417A-BAA9-E686A76F3A94", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4214r:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DE4C87E-CB23-4804-9BBD-2533C5E1D6D4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4214y:-:*:*:*:*:*:*:*", "matchCriteriaId": "7305838B-84CA-4BB8-A350-B2D2844F1041", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4215:-:*:*:*:*:*:*:*", "matchCriteriaId": "D356D196-8AB0-4387-A644-C5E68174A60C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4215r:-:*:*:*:*:*:*:*", "matchCriteriaId": "89587A92-6234-40C3-83DB-F72319FFBC79", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_silver_4216:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F50C03E-CBEB-4738-BDF4-DC296CE9DFA7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-10855m:-:*:*:*:*:*:*:*", "matchCriteriaId": "853DE44A-84C9-4959-865F-D538DF895647", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-10885m:-:*:*:*:*:*:*:*", "matchCriteriaId": "13326C69-C160-482F-BF28-5425B57BE738", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-11855m:-:*:*:*:*:*:*:*", "matchCriteriaId": "D07040D2-2ADC-4CC4-860F-74A7C64FD6FB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-11955m:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F66D2E5-BD5B-406D-82A0-4E1E32EDC337", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1250:-:*:*:*:*:*:*:*", "matchCriteriaId": "557E240A-6760-434E-9C3A-1E5E9129912D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1250e:-:*:*:*:*:*:*:*", "matchCriteriaId": "3D196C46-0F17-4C42-A232-B12CE85D9641", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1250p:-:*:*:*:*:*:*:*", "matchCriteriaId": "6B7565F3-5D41-4A1F-948B-1A55E3AD3EF8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1250te:-:*:*:*:*:*:*:*", "matchCriteriaId": "D3B40170-C992-4386-8429-52A216F64384", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1270:-:*:*:*:*:*:*:*", "matchCriteriaId": "C71A52C1-1FBF-4730-8234-700F87D5E74D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1270e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9219B34E-F94C-4ECA-85E5-850EBD0F41A1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1270te:-:*:*:*:*:*:*:*", "matchCriteriaId": "CCD02FD9-8E63-4B79-8878-07C4316981C8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290:-:*:*:*:*:*:*:*", "matchCriteriaId": "9DF260A0-CDD8-4EE1-B3F4-73CD02FDCD11", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5B84F7DC-EE67-4748-8AE2-7070A6F79BAD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290p:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C156433-48A3-4B2E-A8DB-AF1F09B2EFA6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290t:-:*:*:*:*:*:*:*", "matchCriteriaId": "D78A1CFF-F05E-429C-A9AA-935078574A3B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1290te:-:*:*:*:*:*:*:*", "matchCriteriaId": "FE28AD41-2287-4F2B-924C-30B66A320443", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:*", "matchCriteriaId": "E31FFECA-F663-4B59-9800-1C6A8BD84626", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:*", "matchCriteriaId": "E3F194D4-9425-470E-B812-CD92B5C5A68A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:*", "matchCriteriaId": "6E426811-F97D-42CE-B06D-41CDA84E1B55", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:*", "matchCriteriaId": "4F5F5950-C21F-4142-BA1E-E074FAF249F5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:*", "matchCriteriaId": "E2BC8A89-4CF3-473B-9251-9FA5FF8ADBD6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:*", "matchCriteriaId": "30EE6B10-84FC-4D9D-8F39-4B7000CC85AF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AFDA5D5-F00F-40CC-B492-C433200A491C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2102:-:*:*:*:*:*:*:*", "matchCriteriaId": "29F34489-E85D-4C91-9F3D-22FD83852925", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2104:-:*:*:*:*:*:*:*", "matchCriteriaId": "0453A60C-2B10-4232-B01E-23271885AD21", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2123:-:*:*:*:*:*:*:*", "matchCriteriaId": "3BA7061E-E26C-4905-AB41-18267DD32821", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2125:-:*:*:*:*:*:*:*", "matchCriteriaId": "8AFC055D-B249-4EB4-8A9F-BE4391A27505", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2133:-:*:*:*:*:*:*:*", "matchCriteriaId": "A6F5DF76-FC10-4562-9AD9-6675F3D6CF3C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2135:-:*:*:*:*:*:*:*", "matchCriteriaId": "72F91FC3-CF90-450D-9E71-4A301A997921", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2145:-:*:*:*:*:*:*:*", "matchCriteriaId": "739731E7-F1BF-4D12-B103-E7F85B35307E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2155:-:*:*:*:*:*:*:*", "matchCriteriaId": "7B1C36BE-D4DC-4965-8106-EDA77BDB64DB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2175:-:*:*:*:*:*:*:*", "matchCriteriaId": "15B85362-44E5-4107-AC8A-29DEE2A7EEDD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2195:-:*:*:*:*:*:*:*", "matchCriteriaId": "63293B85-A014-4F23-97EE-6CE3467FCB06", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2223:-:*:*:*:*:*:*:*", "matchCriteriaId": "708D6E00-A2E5-4B08-88E7-C872ACFC341D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2225:-:*:*:*:*:*:*:*", "matchCriteriaId": "0CD8EE0E-2BA3-49DD-91D1-81AB67F16475", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2235:-:*:*:*:*:*:*:*", "matchCriteriaId": "AC75E5CF-4241-45A8-AD45-1F7F077CEEA1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2245:-:*:*:*:*:*:*:*", "matchCriteriaId": "D132291B-AADD-49E3-ADD6-333E1F1D8DFE", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2255:-:*:*:*:*:*:*:*", "matchCriteriaId": "2ADF328B-D286-4C36-9F21-11A58D55D03A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2265:-:*:*:*:*:*:*:*", "matchCriteriaId": "C6D23470-A702-426D-A63C-4F7BAC158762", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2275:-:*:*:*:*:*:*:*", "matchCriteriaId": "750A77C5-1367-4E04-9ABF-1AB2D46C29C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-2295:-:*:*:*:*:*:*:*", "matchCriteriaId": "D1340A29-3428-4FAD-AA07-7F625915E34D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3175x:-:*:*:*:*:*:*:*", "matchCriteriaId": "E50CC669-9555-45E9-A43B-05A21FB040E1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3223:-:*:*:*:*:*:*:*", "matchCriteriaId": "ADA1FA19-A836-4D6A-8C2D-718ECE6866D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3225:-:*:*:*:*:*:*:*", "matchCriteriaId": "3ECEBDB0-2E0A-416B-9737-82C1FC65A06C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3235:-:*:*:*:*:*:*:*", "matchCriteriaId": "C39B6A99-7060-4011-8FA3-E5ABE5C02813", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3245:-:*:*:*:*:*:*:*", "matchCriteriaId": "DF9E723E-1095-424E-A90D-380CA0D2795E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3245m:-:*:*:*:*:*:*:*", "matchCriteriaId": "35380FB9-90FF-405F-8E2E-01C1DD209540", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3265:-:*:*:*:*:*:*:*", "matchCriteriaId": "2215D655-0EA9-4530-AB68-7B1C7360D692", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3265m:-:*:*:*:*:*:*:*", "matchCriteriaId": "020B6FED-EAE2-478C-8FF4-CB75F24E9A9D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3275:-:*:*:*:*:*:*:*", "matchCriteriaId": "AE519C62-F5BB-461C-91EF-2979CD506C63", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:xeon_w-3275m:-:*:*:*:*:*:*:*", "matchCriteriaId": "F693457C-3529-4E62-A672-1B862F235D0F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_field_pg_m6_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "480C5657-5C05-40F5-B76A-E67119727ED8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_field_pg_m6:-:*:*:*:*:*:*:*", "matchCriteriaId": "8F3C3E60-7C36-4F5D-B454-97C9D0FD9459", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc427e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "F6422BF3-01B7-443B-BD2B-80E45D7C3F5F", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc427e:-:*:*:*:*:*:*:*", "matchCriteriaId": "A40D0CDB-7BE6-491F-B730-3B4E10CA159A", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "696F47E6-C1CA-4A58-A91F-4B3EA92954AF", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDF9D4C3-1892-48FA-95B4-835B636A4005", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc477e_pro_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "76E9B752-2DA7-4182-A52E-C13F93FB2B22", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc477e_pro:-:*:*:*:*:*:*:*", "matchCriteriaId": "3FC5CE20-7D08-4496-A857-C3A4BD0AB1AC", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc527g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "9D1BCD50-6174-49A7-BEE4-BD7DD72C09AE", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc527g:-:*:*:*:*:*:*:*", "matchCriteriaId": "55156889-E9DA-4F04-B894-339DC39CA942", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc547g_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "DEB756BB-E343-451A-866D-40B41E059705", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc547g:-:*:*:*:*:*:*:*", "matchCriteriaId": "9EB339B5-602F-4AB5-9998-465FDC6ABD6C", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc627e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "18A51183-A6EF-4AC8-9A85-29FF7768AE3A", "versionEndExcluding": "25.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc627e:-:*:*:*:*:*:*:*", "matchCriteriaId": "9D9AF082-8345-4BE1-B1FC-6E0316BB833B", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc647e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D2A29C2D-A16F-443F-AA01-535B43F8BBBA", "versionEndExcluding": "25.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc647e:-:*:*:*:*:*:*:*", "matchCriteriaId": "E430C4C5-D887-47C6-B50F-66EEE9519151", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc677e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0368B9A-D5FB-4EDA-88BA-E44901F2A0BA", "versionEndExcluding": "25.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc677e:-:*:*:*:*:*:*:*", "matchCriteriaId": "5F9FA42D-B2F0-456F-89B7-6A5789787FBA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_ipc847e_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "41A30BE8-ABAD-48E0-A4B1-1EBD53A31647", "versionEndExcluding": "25.02.10", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_ipc847e:-:*:*:*:*:*:*:*", "matchCriteriaId": "1157418C-14C4-43C4-B63E-7E98D868A94F", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:siemens:simatic_itp1000_firmware:*:*:*:*:*:*:*:*", "matchCriteriaId": "87F0538B-ED6E-40C7-9C2A-4C5DC3D2935E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:siemens:simatic_itp1000:-:*:*:*:*:*:*:*", "matchCriteriaId": "187C6D51-5B86-484D-AE0F-26D1C9465580", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C2089EE-5D7F-47EC-8EA5-0F69790564C4", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:aff_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "57C62B5F-85C4-4A06-BF24-3EBF79EF2783", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:fas_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "5AAF9E0B-2024-4704-B7F7-61E976D73F09", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "7C61DF9A-ABDE-44A2-A060-B088428D5064", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "17C3B32E-E1F2-446A-B8AE-5F3E285BD5B2", "vulnerable": true }, { "criteria": "cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*", "matchCriteriaId": "C3BCF7CA-6C05-4FD5-A965-0F038F63D70A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Race condition in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access." }, { "lang": "es", "value": "Una condici\u00f3n de carrera en el firmware de algunos Intel\u00ae Processors puede habilitar a un usuario privilegiado para permitir potencialmente una escalada de privilegios por medio de un acceso local" } ], "id": "CVE-2020-8670", "lastModified": "2024-11-21T05:39:13.663", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.5, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-06-09T19:15:09.133", "references": [ { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" }, { "source": "secure@intel.com", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210702-0002/" }, { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-309571.pdf" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://security.netapp.com/advisory/ntap-20210702-0002/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00463.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-362" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }