All the vulnerabilites related to intel - whiskey_lake
cve-2022-29277
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2024-08-03 06:17
Severity ?
Summary
Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T06:17:54.724Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.insyde.com/security-pledge"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.insyde.com/security-pledge/SA-2022060"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060"
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-15T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://www.insyde.com/security-pledge"
        },
        {
          "url": "https://www.insyde.com/security-pledge/SA-2022060"
        }
      ],
      "source": {
        "discovery": "INTERNAL"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2022-29277",
    "datePublished": "2022-11-15T00:00:00",
    "dateReserved": "2022-04-15T00:00:00",
    "dateUpdated": "2024-08-03T06:17:54.724Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2020-5955
Vulnerability from cvelistv5
Published
2021-11-03 00:19
Modified
2024-08-04 08:47
Severity ?
Summary
An issue was discovered in Int15MicrocodeSmm in Insyde InsydeH2O before 2021-10-14 on Intel client chipsets. A caller may be able to escalate privileges.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T08:47:40.942Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.insyde.com/products"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://www.insyde.com/security-pledge/SA-2021002"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20220223-0003/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "An issue was discovered in Int15MicrocodeSmm in Insyde InsydeH2O before 2021-10-14 on Intel client chipsets. A caller may be able to escalate privileges."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-02-23T17:06:25",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.insyde.com/products"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://www.insyde.com/security-pledge/SA-2021002"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://security.netapp.com/advisory/ntap-20220223-0003/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2020-5955",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "An issue was discovered in Int15MicrocodeSmm in Insyde InsydeH2O before 2021-10-14 on Intel client chipsets. A caller may be able to escalate privileges."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.insyde.com/products",
              "refsource": "MISC",
              "url": "https://www.insyde.com/products"
            },
            {
              "name": "https://www.insyde.com/security-pledge/SA-2021002",
              "refsource": "CONFIRM",
              "url": "https://www.insyde.com/security-pledge/SA-2021002"
            },
            {
              "name": "https://security.netapp.com/advisory/ntap-20220223-0003/",
              "refsource": "CONFIRM",
              "url": "https://security.netapp.com/advisory/ntap-20220223-0003/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2020-5955",
    "datePublished": "2021-11-03T00:19:13",
    "dateReserved": "2020-01-06T00:00:00",
    "dateUpdated": "2024-08-04T08:47:40.942Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2021-11-03 01:15
Modified
2024-11-21 05:34
Severity ?
Summary
An issue was discovered in Int15MicrocodeSmm in Insyde InsydeH2O before 2021-10-14 on Intel client chipsets. A caller may be able to escalate privileges.



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "49B10F08-8822-419B-BE72-9B0F0FDBA89C",
              "versionEndExcluding": "05.32.30.0001",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:ice_lake:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9827649-F3DA-4197-8641-05B12431D434",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8440F3DC-D7AE-4EAE-9112-A01A762F46E0",
              "versionEndExcluding": "05.41.35.0001",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:tiger_lake:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "986A1A76-AA3C-4397-BFAE-29A3103CD412",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E1C4703-C877-472C-954F-119D8EB7866F",
              "versionEndExcluding": "05.42.11.0026",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:whitley-sp:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84B00972-4647-4DB3-BA0E-F58C9ADD1DB9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "830C9C4E-5CF4-4F84-A92B-2176AE509C88",
              "versionEndExcluding": "05.04.21.0068",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:grantley-ep:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "07CF50C6-6DC2-4058-8F5B-3E33C734B86A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "45F8BEBA-0C8B-4699-ADCB-56885B6F0B44",
              "versionEndExcluding": "05.42.09.0003",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:elkhart_lake:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B58C169-F3F2-4B41-962A-0FB92B207E05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "610A6535-8169-4CAB-B022-14368CFBB2A0",
              "versionEndExcluding": "05.21.51.0040",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:purley-ep_refresh_neon_city:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "88C7EDAC-EBE0-48FC-9950-0B32709B9CE7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD6BD59-D5C8-4213-BE9D-75EB9BBFA805",
              "versionEndExcluding": "05.34.09.0030",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:comet_lake_rvp:-:*:*:*:embedded:*:*:*",
              "matchCriteriaId": "8CE71A90-4BEE-4069-A833-AB48F90B8D4C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "AFD6BD59-D5C8-4213-BE9D-75EB9BBFA805",
              "versionEndExcluding": "05.34.09.0030",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:comet_lake_rvp:-:*:*:*:server:*:*:*",
              "matchCriteriaId": "1C719D29-A53A-4306-BBFD-DD9593690FEE",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01B35D63-9DBA-4BAE-97E0-853571AC058F",
              "versionEndExcluding": "05.32.47.0001",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:comet_lake:-:*:*:*:client:*:*:*",
              "matchCriteriaId": "F39F745E-46B0-4218-9D70-9E5F0B0FE712",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "280A6232-C93A-4412-A064-D452AE893195",
              "versionEndExcluding": "05.23.45.0023",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:whiskey_lake_rvp:-:*:*:*:embedded:*:*:*",
              "matchCriteriaId": "C750C54A-FF27-4E5D-948E-EC45CB3E173D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "280A6232-C93A-4412-A064-D452AE893195",
              "versionEndExcluding": "05.23.45.0023",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:whiskey_lake_rvp:-:*:*:*:server:*:*:*",
              "matchCriteriaId": "17A03701-8970-4EBE-B558-11D1A7D78BD1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FFD82F7-0C18-4C74-B11A-95C15E4257C9",
              "versionEndExcluding": "05.21.43.0001",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:whiskey_lake:-:*:*:*:client:*:*:*",
              "matchCriteriaId": "F8A01C84-AE70-494A-A66D-61BD219A0AA3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62789BFF-C9FF-44DB-945C-99589420A1D2",
              "versionEndExcluding": "05.23.04.0045",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:mehlow:-:*:*:*:embedded:*:*:*",
              "matchCriteriaId": "5087D8BD-9C5D-4B90-94B1-0EF734AD81E4",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62789BFF-C9FF-44DB-945C-99589420A1D2",
              "versionEndExcluding": "05.23.04.0045",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:mehlow-r:-:*:*:*:embedded:*:*:*",
              "matchCriteriaId": "354D0BAE-82FB-4E64-B206-D7420E8856D7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62789BFF-C9FF-44DB-945C-99589420A1D2",
              "versionEndExcluding": "05.23.04.0045",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:mehlow-r:-:*:*:*:server:*:*:*",
              "matchCriteriaId": "B8F5C48C-7F5B-4992-8152-49728D6DB995",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "62789BFF-C9FF-44DB-945C-99589420A1D2",
              "versionEndExcluding": "05.23.04.0045",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:mehlow:-:*:*:*:server:*:*:*",
              "matchCriteriaId": "69B8125F-E78E-4074-BA32-14460F55B5C7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FFD82F7-0C18-4C74-B11A-95C15E4257C9",
              "versionEndExcluding": "05.21.43.0001",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:coffee_lake:-:*:*:*:client:*:*:*",
              "matchCriteriaId": "04621E54-7E61-4706-B97D-EDC5669C0C55",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FFD82F7-0C18-4C74-B11A-95C15E4257C9",
              "versionEndExcluding": "05.21.43.0001",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:cannon_lake:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F825206-FB87-4DC2-B37A-9CCD1FEE4E96",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "09456E7A-46AA-43D7-ABF5-651472387BE5",
              "versionEndExcluding": "05.11.26.0015",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:kaby_lake_mrd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "47F89003-B752-4D2C-A403-92D0BB5BAFA5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4E6AFF2-0CA3-4361-9EDE-78C1786452CA",
              "versionEndExcluding": "05.12.09.0075",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:greenlow:-:*:*:*:embedded:*:*:*",
              "matchCriteriaId": "9926BF3D-78E2-457D-A428-CC7907B28D8B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4E6AFF2-0CA3-4361-9EDE-78C1786452CA",
              "versionEndExcluding": "05.12.09.0075",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:greenlow-r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "401E968C-3B59-4200-953F-0050DBA90E46",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4E6AFF2-0CA3-4361-9EDE-78C1786452CA",
              "versionEndExcluding": "05.12.09.0075",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:greenlow:-:*:*:*:server:*:*:*",
              "matchCriteriaId": "7217CA4C-2C31-40B5-9BDF-74ECC241CC0D",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4E6AFF2-0CA3-4361-9EDE-78C1786452CA",
              "versionEndExcluding": "05.12.09.0075",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:greenlow-r:-:*:*:*:embedded:*:*:*",
              "matchCriteriaId": "EC92BE81-62A8-4732-B73F-A29CA1B36B12",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "69A69D67-E130-4602-BC13-35A73263A6FC",
              "versionEndExcluding": "05.10.48.0001",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:kaby_lake:-:*:*:*:client:*:*:*",
              "matchCriteriaId": "48A18996-C8E8-48D4-A176-9C912F46C8DD",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "517F7ACF-C762-44F9-ACAC-A2204CEB5C42",
              "versionEndExcluding": "05.05.39.0001",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:skylake_mrd:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "463588A2-53C5-45B6-B07B-9D261F43AEDA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "74DC7C5E-921F-4BEA-B0B7-86463C782669",
              "versionEndExcluding": "05.04.15.0001",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:skylake:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4607961C-25DF-499E-A713-D101FE995F1B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "17BF510F-2795-434C-B0A4-B80539D415B2",
              "versionEndExcluding": "05.23.27.0001",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:coffee_lake:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "26FB314D-1062-4CA8-A5E9-6EFB612D8DB3",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:insyde:insydeh2o_uefi_bios:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "17BF510F-2795-434C-B0A4-B80539D415B2",
              "versionEndExcluding": "05.23.27.0001",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:whiskey_lake:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66A81E2D-E1A6-4B0F-B7F3-C76927598E1C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "An issue was discovered in Int15MicrocodeSmm in Insyde InsydeH2O before 2021-10-14 on Intel client chipsets. A caller may be able to escalate privileges."
    },
    {
      "lang": "es",
      "value": "Se ha detectado un problema en Int15MicrocodeSmm en Insyde InsydeH2O versiones anteriores al 14-10-2021 en los chipsets de cliente de Intel. Un llamador puede ser capaz de escalar privilegios"
    }
  ],
  "id": "CVE-2020-5955",
  "lastModified": "2024-11-21T05:34:53.753",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 9.8,
          "baseSeverity": "CRITICAL",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-11-03T01:15:06.930",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20220223-0003/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Product",
        "Vendor Advisory"
      ],
      "url": "https://www.insyde.com/products"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.insyde.com/security-pledge/SA-2021002"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory"
      ],
      "url": "https://security.netapp.com/advisory/ntap-20220223-0003/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Product",
        "Vendor Advisory"
      ],
      "url": "https://www.insyde.com/products"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.insyde.com/security-pledge/SA-2021002"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2022-11-15 22:15
Modified
2024-11-21 06:58
Summary
Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060
Impacted products
Vendor Product Version
amd genoa_firmware *
amd genoa -
amd hygon_1_firmware *
amd hygon_1 -
amd hygon_2_firmware *
amd hygon_2 -
amd hygon_3_firmware *
amd hygon_3 -
amd milan_firmware *
amd milan -
amd milan_firmware *
amd milan -
amd rome_firmware *
amd rome -
amd rome_firmware *
amd rome -
amd ryzen_5300g_firmware *
amd ryzen_5300g -
amd ryzen_5300ge_firmware *
amd ryzen_5300ge -
amd ryzen_5600g_firmware *
amd ryzen_5600g -
amd ryzen_5600ge_firmware *
amd ryzen_5600ge -
amd ryzen_5600x_firmware *
amd ryzen_5600x -
amd ryzen_5700g_firmware *
amd ryzen_5700g -
amd ryzen_5700ge_firmware *
amd ryzen_5700ge -
amd ryzen_5800x_firmware *
amd ryzen_5800x -
amd ryzen_5800x3d_firmware *
amd ryzen_5800x3d -
amd ryzen_5900x_firmware *
amd ryzen_5900x -
amd ryzen_5950x_firmware *
amd ryzen_5950x -
amd snowy_owl_r1000_firmware *
amd snowy_owl_r1000 -
amd snowy_owl_r2000_firmware *
amd snowy_owl_r2000 -
amd snowy_owl_v2000_firmware *
amd snowy_owl_v2000 -
amd snowy_owl_v3000_firmware *
amd snowy_owl_v3000 -
intel alder_lake_firmware *
intel alder_lake -
intel bakerville_firmware *
intel bakerville -
intel cedar_island_firmware *
intel cedar_island -
intel idaville_firmware *
intel idaville -
intel comet_lake-s_firmware *
intel comet_lake-s -
intel tiger_lake_h\/up3_firmware *
intel tiger_lake_h\/up3 -
intel whiskey_lake_firmware *
intel whiskey_lake -
intel denverton_firmware *
intel denverton -
intel eagle_stream_firmware *
intel eagle_stream -
intel grangeville_de_ns_firmware *
intel grangeville_de_ns -
intel granville_de_firmware *
intel granville_de -
intel greenlow_firmware *
intel greenlow -
intel greenlow-r_firmware *
intel greenlow-r -
intel mehlow_firmware *
intel mehlow -
intel mehlow-r_firmware *
intel mehlow-r -
intel tatlow_firmware *
intel tatlow -
intel purley-r_firmware *
intel purley-r -
intel whitley_firmware *
intel whitley -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:genoa_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCC60EFA-7174-4E91-A33F-794935B12334",
              "versionEndExcluding": "05.52.25.0006",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:genoa:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "90592BBD-A547-41D5-9696-D93392467417",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:hygon_1_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "05922CE9-07BA-43C8-9B7E-344F9AACEC8E",
              "versionEndExcluding": "05.36.26.0016",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:hygon_1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1E855A2-4673-41C3-8966-8BE1225B4117",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:hygon_2_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9BFD1DF-1C4A-44D6-8E34-AA357AD99C0C",
              "versionEndExcluding": "05.36.26.0016",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:hygon_2:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED45EDED-9C4E-4D94-9101-AC52AAC3DA88",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:hygon_3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "A4879580-095C-4503-8D81-5CCE09B6CEB4",
              "versionEndExcluding": "05.44.26.0007",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:hygon_3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B569C92C-0C16-4F5E-92F4-CF6502131A3A",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:milan_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B638FCDF-0ADD-4815-BD0A-3157D212A130",
              "versionEndExcluding": "05.36.10.0017",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:milan:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "89C2BBB6-469A-48A4-85EB-A6BBD21AA27F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:milan_firmware:*:*:*:*:embedded:*:*:*",
              "matchCriteriaId": "29F98F52-0086-4F25-8CBB-909DD79A2D71",
              "versionEndExcluding": "05.36.26.0016",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:milan:-:*:*:*:embedded:*:*:*",
              "matchCriteriaId": "59B0388D-7B0E-439F-896B-A4E08F657606",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:rome_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E55655FF-21B7-4602-9C4D-3CC0320CEF99",
              "versionEndExcluding": "05.36.10.0017",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:rome:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "39415311-BEFC-4507-8964-75C393381633",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:rome_firmware:*:*:*:*:embedded:*:*:*",
              "matchCriteriaId": "2F29A768-8EF1-4F50-A78D-56BC9BE41484",
              "versionEndExcluding": "05.36.26.0016",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:rome:-:*:*:*:embedded:*:*:*",
              "matchCriteriaId": "95D58B14-392D-4F65-8FF0-199867D3D2BB",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5300g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "96C827CD-61BA-4FA8-886C-08815FA83D4A",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D857EFE-B24E-4228-BB1E-34F9BC763A11",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5300ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C252F160-6CBE-42EC-A6AC-82F932348A55",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CC472B-1502-402D-B2AC-8A63A69F2A27",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5600g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "73443456-6425-46B1-A602-A326B410FE7A",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8937FABB-B60E-4780-BB6D-B1B99DD69219",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5600ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4D29447B-3FF9-4B29-AA00-5179E54A2991",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B83F1F6-64B1-40D3-817A-E27CEB2E93EC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5600x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "07E151CD-DED7-4900-8346-7CC60447A3D5",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6CE435D-B9E9-43D6-AFBC-74E258DC4DFA",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5700g_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C14D153C-8CC3-40B2-B694-08C4FBB67A8C",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20F5FCF8-FDDA-43F6-AFFD-1874DB2BB806",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5700ge_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "47E4A102-1306-481F-96D5-3F677FE54152",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA1A9BEC-27AB-40AD-BBED-4420451D3793",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5800x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "D1FF208E-2271-440D-9398-2807CBF87233",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "48F6B331-4C0F-49FF-A39F-381B9ADE3483",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5800x3d_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA8CD6DB-42C5-4584-8E22-090614949DF3",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "238EA54F-4809-4D8F-9F18-71135FED9D05",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5900x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7872EB6C-5C3D-4804-9934-53BD91A0B88E",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "050C802C-D8C7-4D58-BA6E-AC48EEF25215",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:ryzen_5950x_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "48018BD4-08DF-4D87-A6AD-251236FD673E",
              "versionEndExcluding": "05.44.30.0004",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD9478CC-DF88-4833-BBB2-2D82D9BBFA63",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:snowy_owl_r1000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E840A2C-A5BA-4054-A932-07B1AED61C3E",
              "versionEndExcluding": "05.32.50.0018",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:snowy_owl_r1000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AA109B5-E052-4944-AA5C-96B6E8842902",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:snowy_owl_r2000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2CFD31CB-623F-46E9-B181-AC5D96349A47",
              "versionEndExcluding": "05.44.30.0005",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:snowy_owl_r2000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1963FD6B-57F6-4CDC-A92B-20079526ACB0",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:snowy_owl_v2000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4A998C25-E37C-4987-AFBE-91AA6F324A0E",
              "versionEndExcluding": "05.44.30.0007",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:snowy_owl_v2000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5EACEBA7-F35C-4FCD-B146-4E1A274B8E3B",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:amd:snowy_owl_v3000_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "669E1226-DA98-4A6B-BF79-602258AAFC80",
              "versionEndExcluding": "05.44.30.0007",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:amd:snowy_owl_v3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "61FA4046-4CD6-4592-B972-1C2ADD4978D1",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:alder_lake_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5A94F47D-AC22-44FF-A9F9-B3709D5A0897",
              "versionEndExcluding": "05.44.23.0047",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:alder_lake:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E39D7884-8579-4B0C-BC50-66DFE48583A5",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:bakerville_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "9238729D-BE76-4DDE-B3BC-04AA0E96EDF7",
              "versionEndExcluding": "05.21.51.0026",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:bakerville:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6DBB308D-E36F-4ECD-8DFF-3784FCECDBEC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:cedar_island_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9165049-02FB-436E-84CD-0F1C9376CF5D",
              "versionEndExcluding": "05.42.11.0021",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:cedar_island:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3EEA11CC-5BB3-41FF-AAC5-2A74C3E862F2",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:idaville_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "01F0F8C2-28B8-4670-A47F-999B98A2F6CB",
              "versionEndExcluding": "05.43.12.0052",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:idaville:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "25C6C611-A06F-4855-B224-C05CD6EBA88F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:comet_lake-s_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CB35619B-30AB-4F2F-BBE9-B382AB2A20A2",
              "versionEndExcluding": "05.43.12.0052",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:comet_lake-s:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "20A2F526-3B6E-433A-9CCC-471686292193",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:tiger_lake_h\\/up3_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5984089E-3004-476E-A0EA-8B745EDB5D8C",
              "versionEndExcluding": "05.43.12.0052",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:tiger_lake_h\\/up3:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "D856B7FC-16F1-490E-AB0C-14FFB14718A7",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:whiskey_lake_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "489E0210-427F-4D52-B184-B908EC13325F",
              "versionEndExcluding": "05.43.12.0052",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:whiskey_lake:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "66A81E2D-E1A6-4B0F-B7F3-C76927598E1C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:denverton_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1978C90-172F-49AE-8F2C-C5FEDAFF9F30",
              "versionEndExcluding": "05.10.12.0042",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:denverton:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A70CCE3F-ED5E-4186-84C7-69B58839E386",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:eagle_stream_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2FB3A30-921A-45AF-AE16-9C3BCECB1125",
              "versionEndExcluding": "05.44.25.0052",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:eagle_stream:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9F85CBD5-5CE0-4A52-8996-4674CF17D5CC",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:grangeville_de_ns_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C665AF80-C500-4A94-BD6C-8A4ECB8FB64E",
              "versionEndExcluding": "05.27.26.0023",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:grangeville_de_ns:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "64D791A1-0735-4C4C-A0BB-D2D96790C3F9",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:granville_de_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF2F487C-0A2C-4828-88D1-04C5C98AD56A",
              "versionEndExcluding": "05.05.15.0038",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:granville_de:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F4270D4E-9FC2-475B-93BD-A5CB6D565B28",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:greenlow_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "17DFAFE0-1E3E-408C-9FD6-7174C07CF909",
              "versionEndExcluding": "05.10.12.0042",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:greenlow:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "44431D1A-D10F-414D-A400-0C5C4F06F99C",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:greenlow-r_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5B3B4F7-A7D4-4BC1-9A18-B71298FF4C52",
              "versionEndExcluding": "05.10.12.0042",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:greenlow-r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "401E968C-3B59-4200-953F-0050DBA90E46",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:mehlow_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B7BD8DE-932E-4EA7-A010-E1B18AA8E982",
              "versionEndExcluding": "05.10.12.0042",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:mehlow:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9DBE1F12-551F-4AEF-81A1-E6A588C1C45F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:mehlow-r_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "41AFCB8E-A4D9-4A0C-9088-57BA643E05A5",
              "versionEndExcluding": "05.10.12.0042",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:mehlow-r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C701B92D-AF94-459B-BC6A-612111555231",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:tatlow_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "97883F64-02E6-46C8-A70B-A01E120A0FF3",
              "versionEndExcluding": "05.10.12.0042",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:tatlow:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "84719A8D-75B1-42F7-A568-F7FD501F8B1F",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:purley-r_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7EDB05C1-3989-4E5F-A560-0E3A8449124D",
              "versionEndExcluding": "05.21.51.0048",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:purley-r:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "43D86D5A-334F-418F-88BE-2A24B06E80A6",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:whitley_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "354D107D-B11F-4A10-A50B-8C22E5B93C16",
              "versionEndExcluding": "05.42.23.0066",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:whitley:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F449054E-C729-485F-B5FA-AA49FF0D0294",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060"
    },
    {
      "lang": "es",
      "value": "Las comprobaciones incorrectas del puntero dentro del controlador FwBlockServiceSmm pueden permitir modificaciones arbitrarias de la RAM. Durante la revisi\u00f3n del controlador FwBlockServiceSmm, se podr\u00eda enga\u00f1ar a ciertas instancias de SpiAccessLib para que escriban 0xff en direcciones SMRAM y del sistema arbitrarias. Solucionado en: \nINTEL Purley-R: 05.21.51.0048 \nWhitley: 05.42.23.0066 \nCedar Island: 05.42.11.0021 \nEagle Stream: 05.44.25.0052 \nGreenlow/Greenlow-R(skylake/kabylake): Trunk \nMehlow/Mehlow-R (CoffeeLake-S) : Trunk \nTatlow (RKL-S): Trunk \nDenverton: 05.10.12.0042 \nSnow Ridge: Trunk \nGraneville DE: 05.05.15.0038 \nGrangeville DE NS: 05.27.26.0023 \nBakerville: 05.21.51.0026 \nIdaville: 05.44.27.0030 \nWhiskey Lake: Trunk \nComet Lake-S : Trunk \nTiger Lake H/UP3: 05.43.12.0052 \nAlder Lake: 05.44.23.0047 \nGemini Lake: No afectado \nApollo Lake: No afectado \nElkhart Lake: 05.44.30.0018 \nAMD ROMA: Trunk \nMILAN: 05.36.10.0017 \nG\u00c9NOVA: 05.52.25.0006 \nNival: Trunk \nR1000: 05.32.50.0018 \nR2000: 05.44.30.0005 \nV2000: Trunk \nV3000: 05.44.30.0007 \nRyzen 5000: 05.44.30.0004 Embedded \nROME: Trunk Embedded \nMILAN: Trunk \nHygon Hygon #1/#2: 05.36.2 6.0016 \nHygon #3: 05.44. 26.0007 \nhttps://www.insyde.com/security-pledge/SA-2022060"
    }
  ],
  "id": "CVE-2022-29277",
  "lastModified": "2024-11-21T06:58:51.380",
  "metrics": {
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 6.0,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2022-11-15T22:15:10.933",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.insyde.com/security-pledge"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.insyde.com/security-pledge/SA-2022060"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.insyde.com/security-pledge"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.insyde.com/security-pledge/SA-2022060"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-787"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}