Search criteria
2085 vulnerabilities by HP
CVE-2025-11531 (GCVE-0-2025-11531)
Vulnerability from cvelistv5 – Published: 2025-12-09 18:29 – Updated: 2025-12-09 19:26
VLAI?
Title
HP System Event Utility and Omen Gaming Hub – Potential Arbitrary Code Execution
Summary
HP System Event Utility and Omen Gaming Hub might allow execution of
certain files outside of their restricted paths. This
potential vulnerability was remediated with HP System
Event Utility version 3.2.12 and Omen Gaming Hub version
1101.2511.101.0.
Severity ?
CWE
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Assigner
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| HP Inc | HP System Event Utility |
Affected:
0 , < 3.2.12
(custom)
|
|||||||
|
|||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-11531",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-09T19:25:57.896127Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-09T19:26:04.775Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "HP System Event Utility",
"vendor": "HP Inc",
"versions": [
{
"lessThan": "3.2.12",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Omen Gaming Hub",
"vendor": "HP Inc",
"versions": [
{
"lessThan": "1101.2511.101.0",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hp_inc:hp_system_event_utility:*:*:*:*:*:*:*:*",
"versionEndExcluding": "3.2.12",
"versionStartIncluding": "0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hp_inc:omen_gaming_hub:*:*:*:*:*:*:*:*",
"versionEndExcluding": "1101.2511.101.0",
"versionStartIncluding": "0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "HP System Event Utility and Omen Gaming Hub might allow execution of \ncertain files outside of their restricted paths. This\n potential vulnerability was remediated with HP System \nEvent Utility version 3.2.12 and Omen Gaming Hub version \n1101.2511.101.0."
}
],
"value": "HP System Event Utility and Omen Gaming Hub might allow execution of \ncertain files outside of their restricted paths. This\n potential vulnerability was remediated with HP System \nEvent Utility version 3.2.12 and Omen Gaming Hub version \n1101.2511.101.0."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-22",
"description": "CWE-22: Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-09T18:29:51.181Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_13537533-13537555-16/hpsbgn04079"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "HP System Event Utility and Omen Gaming Hub \u2013 Potential Arbitrary Code Execution",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-11531",
"datePublished": "2025-12-09T18:29:51.181Z",
"dateReserved": "2025-10-08T19:07:15.960Z",
"dateUpdated": "2025-12-09T19:26:04.775Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-13492 (GCVE-0-2025-13492)
Vulnerability from cvelistv5 – Published: 2025-12-03 16:33 – Updated: 2025-12-04 04:55
VLAI?
Title
HP Image Assistant - Potential Escalation of Privilege
Summary
A potential security vulnerability has been identified in HP Image Assistant for versions prior to 5.3.3. The vulnerability
could potentially allow a local attacker to escalate privileges via a race condition when installing packages.
Severity ?
CWE
- CWE-363 - Race Condition Enabling Link Following
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc | HP Image Assistant |
Affected:
0 , < 5.3.3
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-13492",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-03T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-04T04:55:15.971Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "HP Image Assistant",
"vendor": "HP Inc",
"versions": [
{
"lessThan": "5.3.3",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hp_inc:hp_image_assistant:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.3.3",
"versionStartIncluding": "0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A potential security vulnerability has been identified in HP Image Assistant for versions prior to 5.3.3. The vulnerability\n could potentially allow a local attacker to escalate privileges via a race condition when installing packages."
}
],
"value": "A potential security vulnerability has been identified in HP Image Assistant for versions prior to 5.3.3. The vulnerability\n could potentially allow a local attacker to escalate privileges via a race condition when installing packages."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "PASSIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-363",
"description": "CWE-363: Race Condition Enabling Link Following",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-03T16:33:39.056Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_13505078-13505143-16/hpsbgn04078"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "HP Image Assistant - Potential Escalation of Privilege",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-13492",
"datePublished": "2025-12-03T16:33:39.056Z",
"dateReserved": "2025-11-20T21:13:55.431Z",
"dateUpdated": "2025-12-04T04:55:15.971Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-11761 (GCVE-0-2025-11761)
Vulnerability from cvelistv5 – Published: 2025-11-03 15:13 – Updated: 2025-11-04 04:55
VLAI?
Title
HP Client Management Script Library – Security Update
Summary
A potential security vulnerability has been identified in the HP Client Management Script Library software, which might allow escalation of privilege during the installation process. HP is releasing software updates to mitigate the potential vulnerability.
Severity ?
CWE
- CWE-427 - Uncontrolled Search Path Element
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc | HP Client Management Script Library |
Affected:
1.0.0 , < <1.85
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-11761",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-03T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-04T04:55:15.307Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "HP Client Management Script Library",
"vendor": "HP Inc",
"versions": [
{
"lessThan": "\u003c1.85",
"status": "affected",
"version": "1.0.0",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA potential security vulnerability has been identified in the HP Client Management Script Library software, which might allow escalation of privilege during the installation process. HP is releasing software updates to mitigate the potential vulnerability.\u003c/span\u003e"
}
],
"value": "A potential security vulnerability has been identified in the HP Client Management Script Library software, which might allow escalation of privilege during the installation process. HP is releasing software updates to mitigate the potential vulnerability."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-427",
"description": "CWE-427 Uncontrolled Search Path Element",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-03T15:13:39.263Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_13187651-13187675-16/hpsbhf04058"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "HP Client Management Script Library \u2013 Security Update",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-11761",
"datePublished": "2025-11-03T15:13:39.263Z",
"dateReserved": "2025-10-14T20:23:06.506Z",
"dateUpdated": "2025-11-04T04:55:15.307Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-43017 (GCVE-0-2025-43017)
Vulnerability from cvelistv5 – Published: 2025-10-28 20:40 – Updated: 2025-10-30 03:56
VLAI?
Title
HP ThinPro 8.1 SP8 Security Updates
Summary
HP ThinPro 8.1 System management application failed to verify user's true id. HP has released HP ThinPro 8.1 SP8, which includes updates to mitigate potential vulnerabilities.
Severity ?
CWE
- CWE-250 - Execution with Unnecessary Privileges
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | HP ThinPro 8.1 |
Affected:
SP1 , < <SP8
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43017",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-29T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-30T03:56:02.832Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "HP ThinPro 8.1",
"vendor": "HP Inc.",
"versions": [
{
"lessThan": "\u003cSP8",
"status": "affected",
"version": "SP1",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hp_inc.:hp_thinpro_8.1:*:*:*:*:*:*:*:*",
"versionEndExcluding": "\u003csp8",
"versionStartIncluding": "sp1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "HP ThinPro 8.1 System management application failed to verify user\u0027s true id. HP has released HP ThinPro 8.1 SP8, which includes updates to mitigate potential vulnerabilities."
}
],
"value": "HP ThinPro 8.1 System management application failed to verify user\u0027s true id. HP has released HP ThinPro 8.1 SP8, which includes updates to mitigate potential vulnerabilities."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 8.5,
"baseSeverity": "HIGH",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-250",
"description": "CWE-250: Execution with Unnecessary Privileges",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-28T20:40:19.040Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_13164593-13164617-16/hpsbhf04066"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "HP ThinPro 8.1 SP8 Security Updates",
"x_generator": {
"engine": "Vulnogram 0.4.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43017",
"datePublished": "2025-10-28T20:40:19.040Z",
"dateReserved": "2025-04-16T13:49:21.688Z",
"dateUpdated": "2025-10-30T03:56:02.832Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-43024 (GCVE-0-2025-43024)
Vulnerability from cvelistv5 – Published: 2025-10-27 23:11 – Updated: 2025-10-28 14:57
VLAI?
Title
HP ThinPro 8.1 SP8 Security Updates
Summary
A GUI dialog of an application allows to view what files are in the file system without proper authorization.
Severity ?
CWE
- CWE-497 - Exposure of Sensitive System Information to an Unauthorized Control Sphere
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc | ThinPro 8.1 |
Affected:
SP1 , < <SP8
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43024",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-28T14:57:46.070734Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-28T14:57:56.715Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"Linux"
],
"product": "ThinPro 8.1",
"vendor": "HP Inc",
"versions": [
{
"lessThan": "\u003cSP8",
"status": "affected",
"version": "SP1",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hp_inc:thinpro_8.1:*:*:linux:*:*:*:*:*",
"versionEndExcluding": "\u003csp8",
"versionStartIncluding": "sp1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A GUI dialog of an application allows to view what files are in the file system without proper authorization.\n\n\u003cp\u003e\u003c/p\u003e"
}
],
"value": "A GUI dialog of an application allows to view what files are in the file system without proper authorization."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-497",
"description": "CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-27T23:11:35.638Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_13164593-13164617-16/hpsbhf04066"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "HP ThinPro 8.1 SP8 Security Updates",
"x_generator": {
"engine": "Vulnogram 0.4.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43024",
"datePublished": "2025-10-27T23:11:35.638Z",
"dateReserved": "2025-04-16T13:49:21.689Z",
"dateUpdated": "2025-10-28T14:57:56.715Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-10578 (GCVE-0-2025-10578)
Vulnerability from cvelistv5 – Published: 2025-10-01 18:44 – Updated: 2025-10-02 03:55
VLAI?
Title
HP Support Assistant - Potential Escalation of Privilege
Summary
A potential security vulnerability has been identified in the HP Support Assistant for versions prior to 9.47.41.0. The vulnerability could potentially allow a local attacker to escalate privileges via an arbitrary file write.
Severity ?
CWE
- CWE-269 - Improper Privilege Management
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | HP Support Assistant |
Unknown:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-10578",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-01T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-02T03:55:48.375Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "HP Support Assistant",
"vendor": "HP Inc.",
"versions": [
{
"status": "unknown",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA potential security vulnerability has been identified in the HP Support Assistant for versions prior to 9.47.41.0. The vulnerability could potentially allow a local attacker to escalate privileges via an arbitrary file write.\u003c/span\u003e"
}
],
"value": "A potential security vulnerability has been identified in the HP Support Assistant for versions prior to 9.47.41.0. The vulnerability could potentially allow a local attacker to escalate privileges via an arbitrary file write."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "CWE-269 Improper Privilege Management",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-01T18:44:49.949Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_13048717-13048785-16/hpsbgn04053"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "HP Support Assistant - Potential Escalation of Privilege",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-10578",
"datePublished": "2025-10-01T18:44:49.949Z",
"dateReserved": "2025-09-16T19:05:48.213Z",
"dateUpdated": "2025-10-02T03:55:48.375Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43491 (GCVE-0-2025-43491)
Vulnerability from cvelistv5 – Published: 2025-09-09 20:29 – Updated: 2025-09-11 03:56
VLAI?
Title
Poly Lens Desktop Application – Privilege Escalation
Summary
A vulnerability in the Poly Lens Desktop application running on the Windows platform might allow modifications to the filesystem, which might lead to SYSTEM level privileges being granted.
Severity ?
CWE
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43491",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-09-10T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-09-11T03:56:33.896Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Poly Lens",
"vendor": "HP, Inc.",
"versions": [
{
"status": "affected",
"version": "See HP security bulletin reference for affected versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA vulnerability in the Poly Lens Desktop application running on the Windows platform might allow modifications to the filesystem, which might lead to SYSTEM level privileges being granted.\u003c/span\u003e"
}
],
"value": "A vulnerability in the Poly Lens Desktop application running on the Windows platform might allow modifications to the filesystem, which might lead to SYSTEM level privileges being granted."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-99",
"description": "CWE-99",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-09-09T20:29:47.968Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12979589-12979615-16/hpsbpy04048"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Lens Desktop Application \u2013 Privilege Escalation",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43491",
"datePublished": "2025-09-09T20:29:47.968Z",
"dateReserved": "2025-04-16T15:25:24.713Z",
"dateUpdated": "2025-09-11T03:56:33.896Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43023 (GCVE-0-2025-43023)
Vulnerability from cvelistv5 – Published: 2025-07-28 17:46 – Updated: 2025-11-04 21:10
VLAI?
Title
HP Linux Imaging and Printing Software - Use of DSA Key
Summary
A potential security vulnerability has been identified in the HP Linux Imaging and Printing Software documentation. This potential vulnerability is due to the use of a weak code signing key, Digital Signature Algorithm (DSA).
Severity ?
CWE
- CWE-347 - Improper Verification of Cryptographic Signature
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP, Inc. | HP Linux Imaging and Printing Software |
Affected:
See HP security bulletin reference for affected versions
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43023",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-28T18:00:04.541562Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-04T18:32:55.875Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-11-04T21:10:27.277Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "http://www.openwall.com/lists/oss-security/2025/08/22/4"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "HP Linux Imaging and Printing Software",
"vendor": "HP, Inc.",
"versions": [
{
"status": "affected",
"version": "See HP security bulletin reference for affected versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA potential security vulnerability has been identified in the HP Linux Imaging and Printing Software documentation. This potential vulnerability is due to the use of a weak code signing key, Digital Signature Algorithm (DSA).\u003c/span\u003e"
}
],
"value": "A potential security vulnerability has been identified in the HP Linux Imaging and Printing Software documentation. This potential vulnerability is due to the use of a weak code signing key, Digital Signature Algorithm (DSA)."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "HIGH",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:H/AT:N/PR:H/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-347",
"description": "CWE-347 Improper Verification of Cryptographic Signature",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-28T17:46:46.398Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12804224-12804228-16/hpsbpi04033"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "HP Linux Imaging and Printing Software - Use of DSA Key",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43023",
"datePublished": "2025-07-28T17:46:46.398Z",
"dateReserved": "2025-04-16T13:49:21.689Z",
"dateUpdated": "2025-11-04T21:10:27.277Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-43489 (GCVE-0-2025-43489)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:36 – Updated: 2025-07-23 15:14
VLAI?
Title
Poly Clariti Manager - Multiple Security Vulnerabilities
Summary
A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.1. The vulnerability could deserialize untrusted data without validation. HP has addressed the issue in the latest software update.
Severity ?
CWE
- CWE-502 - Deserialization of Untrusted Data
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43489",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T14:53:26.779409Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T15:14:51.346Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.1. The vulnerability could deserialize untrusted data without validation. HP has addressed the issue in the latest software update.\u003cbr\u003e"
}
],
"value": "A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.1. The vulnerability could deserialize untrusted data without validation. HP has addressed the issue in the latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 2,
"baseSeverity": "LOW",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "CWE-502 Deserialization of Untrusted Data",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:36:58.181Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43489",
"datePublished": "2025-07-22T23:36:58.181Z",
"dateReserved": "2025-04-16T15:25:24.712Z",
"dateUpdated": "2025-07-23T15:14:51.346Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43488 (GCVE-0-2025-43488)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:26 – Updated: 2025-07-23 15:14
VLAI?
Title
Poly Clariti Manager - Multiple Security Vulnerabilities
Summary
A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.2. The vulnerability could allow a bypass of the application's XSS filter by submitting untrusted characters. HP has addressed the issue in the latest software update.
Severity ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43488",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T14:53:32.556379Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T15:14:56.207Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.2. The vulnerability could allow a bypass of the application\u0027s XSS filter by submitting untrusted characters. HP has addressed the issue in the latest software update.\u003cbr\u003e"
}
],
"value": "A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.2. The vulnerability could allow a bypass of the application\u0027s XSS filter by submitting untrusted characters. HP has addressed the issue in the latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 2,
"baseSeverity": "LOW",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:26:24.451Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43488",
"datePublished": "2025-07-22T23:26:24.451Z",
"dateReserved": "2025-04-16T15:25:24.712Z",
"dateUpdated": "2025-07-23T15:14:56.207Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43487 (GCVE-0-2025-43487)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:24 – Updated: 2025-07-23 13:18
VLAI?
Title
Poly Clariti Manager - Multiple Security Vulnerabilities
Summary
A potential privilege escalation through Sudo vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.2. The firmware flaw does not properly implement access controls. HP has addressed the issue in the latest software update.
Severity ?
CWE
- CWE-250 - Execution with Unnecessary Privileges
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43487",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T13:17:37.578534Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T13:18:02.474Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A potential privilege escalation through Sudo vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.2. The firmware flaw does not properly implement access controls. HP has addressed the issue in the latest software update.\u003cbr\u003e"
}
],
"value": "A potential privilege escalation through Sudo vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.2. The firmware flaw does not properly implement access controls. HP has addressed the issue in the latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-250",
"description": "CWE-250: Execution with Unnecessary Privileges",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:24:44.253Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43487",
"datePublished": "2025-07-22T23:24:44.253Z",
"dateReserved": "2025-04-16T15:25:24.712Z",
"dateUpdated": "2025-07-23T13:18:02.474Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43486 (GCVE-0-2025-43486)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:21 – Updated: 2025-07-23 14:56
VLAI?
Title
Poly Clariti Manager - Multiple Security Vulnerabilities
Summary
A potential stored cross-site scripting vulnerability has been
identified in the Poly Clariti Manager for versions prior to 10.12.1. The
website allows user input to be stored and rendered without proper
sanitization. HP has addressed the issue in the latest software update.
Severity ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43486",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T14:56:00.463994Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T14:56:14.596Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A potential stored cross-site scripting vulnerability has been\nidentified in the Poly Clariti Manager for versions prior to 10.12.1. The\nwebsite allows user input to be stored and rendered without proper\nsanitization. HP has addressed the issue in the latest software update."
}
],
"value": "A potential stored cross-site scripting vulnerability has been\nidentified in the Poly Clariti Manager for versions prior to 10.12.1. The\nwebsite allows user input to be stored and rendered without proper\nsanitization. HP has addressed the issue in the latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:21:42.248Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43486",
"datePublished": "2025-07-22T23:21:42.248Z",
"dateReserved": "2025-04-16T15:25:24.712Z",
"dateUpdated": "2025-07-23T14:56:14.596Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43485 (GCVE-0-2025-43485)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:18 – Updated: 2025-07-23 14:58
VLAI?
Title
Poly Clariti Manager - Multiple Security Vulnerabilities
Summary
A potential security
vulnerability has been identified in the Poly Clariti Manager for versions
prior to 10.12.2. The vulnerability could potentially allow a privileged
user to retrieve credentials from the log files. HP has addressed the issue in
the latest software update.
Severity ?
CWE
- CWE-532 - Insertion of Sensitive Information into Log File
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43485",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T14:58:23.583510Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T14:58:30.540Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eA potential security\nvulnerability has been identified in the Poly Clariti Manager for versions\nprior to 10.12.2. The vulnerability could potentially allow a privileged\nuser to retrieve credentials from the log files. HP has addressed the issue in\nthe latest software update.\u003c/p\u003e"
}
],
"value": "A potential security\nvulnerability has been identified in the Poly Clariti Manager for versions\nprior to 10.12.2. The vulnerability could potentially allow a privileged\nuser to retrieve credentials from the log files. HP has addressed the issue in\nthe latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-532",
"description": "CWE-532 Insertion of Sensitive Information into Log File",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:18:37.858Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43485",
"datePublished": "2025-07-22T23:18:37.858Z",
"dateReserved": "2025-04-16T15:25:24.712Z",
"dateUpdated": "2025-07-23T14:58:30.540Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43484 (GCVE-0-2025-43484)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:16 – Updated: 2025-07-23 20:11
VLAI?
Title
Poly Clariti Manager - Multiple Security Vulnerabilities
Summary
A potential reflected cross-site scripting vulnerability has been
identified in the Poly Clariti Manager for versions prior to 10.12.1. The
website does not validate or sanitize the user input before rendering it in the
response. HP has addressed the issue in the latest software update.
Severity ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43484",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T20:11:34.526319Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T20:11:43.688Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A potential reflected cross-site scripting vulnerability has been\nidentified in the Poly Clariti Manager for versions prior to 10.12.1. The\nwebsite does not validate or sanitize the user input before rendering it in the\nresponse. HP has addressed the issue in the latest software update."
}
],
"value": "A potential reflected cross-site scripting vulnerability has been\nidentified in the Poly Clariti Manager for versions prior to 10.12.1. The\nwebsite does not validate or sanitize the user input before rendering it in the\nresponse. HP has addressed the issue in the latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 6,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:16:02.138Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43484",
"datePublished": "2025-07-22T23:16:02.138Z",
"dateReserved": "2025-04-16T15:25:24.712Z",
"dateUpdated": "2025-07-23T20:11:43.688Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43483 (GCVE-0-2025-43483)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:14 – Updated: 2025-07-23 20:11
VLAI?
Title
Poly Clariti Manager - Multiple Security Vulnerabilities
Summary
A potential security vulnerability has been
identified in the Poly Clariti Manager for versions prior to 10.12.1. The
vulnerability could allow the retrieval of hardcoded cryptographic keys. HP has
addressed the issue in the latest software update.
Severity ?
CWE
- CWE-321 - Use of Hard-coded Cryptographic Key
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43483",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T20:10:49.864916Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T20:11:12.870Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003e\u003cp\u003eA potential security vulnerability has been\nidentified in the Poly Clariti Manager for versions prior to 10.12.1. The\nvulnerability could allow the retrieval of hardcoded cryptographic keys. HP has\naddressed the issue in the latest software update.\u003c/p\u003e\u003c/span\u003e"
}
],
"value": "A potential security vulnerability has been\nidentified in the Poly Clariti Manager for versions prior to 10.12.1. The\nvulnerability could allow the retrieval of hardcoded cryptographic keys. HP has\naddressed the issue in the latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-321",
"description": "CWE-321: Use of Hard-coded Cryptographic Key",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:14:26.801Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43483",
"datePublished": "2025-07-22T23:14:26.801Z",
"dateReserved": "2025-04-16T15:25:24.712Z",
"dateUpdated": "2025-07-23T20:11:12.870Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43022 (GCVE-0-2025-43022)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:05 – Updated: 2025-07-23 20:10
VLAI?
Title
Poly Clariti Manager - Multiple Security Vulnerabilities
Summary
A potential SQL injection vulnerability has been identified in the Poly
Clariti Manager for versions prior to 10.12.1. The vulnerability could allow
a privileged user to execute SQL commands. HP has addressed the issue in
the latest software update.
Severity ?
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43022",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T20:10:21.143873Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T20:10:32.249Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A potential SQL injection vulnerability has been identified in the Poly\nClariti Manager for versions prior to 10.12.1. The vulnerability could allow\na privileged user to execute SQL commands. HP has addressed the issue in\nthe latest software update.\n\n\n\n\u003cbr\u003e"
}
],
"value": "A potential SQL injection vulnerability has been identified in the Poly\nClariti Manager for versions prior to 10.12.1. The vulnerability could allow\na privileged user to execute SQL commands. HP has addressed the issue in\nthe latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:05:24.070Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43022",
"datePublished": "2025-07-22T23:05:24.070Z",
"dateReserved": "2025-04-16T13:49:21.689Z",
"dateUpdated": "2025-07-23T20:10:32.249Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43021 (GCVE-0-2025-43021)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:03 – Updated: 2025-07-23 20:09
VLAI?
Title
Poly Clariti Manager - Multiple Security Vulnerabilities
Summary
A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.1. The vulnerability could allow the use and retrieval of the default password. HP has addressed the issue in the latest software update.
Severity ?
CWE
- CWE-1393 - Use of Default Password
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43021",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T20:08:55.434389Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T20:09:03.981Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003eA potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.1. The vulnerability could allow the use and retrieval of the default password. HP has addressed the issue in the latest software update.\u003c/span\u003e\n\n\n\n\n\n\u003cbr\u003e"
}
],
"value": "A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.1. The vulnerability could allow the use and retrieval of the default password. HP has addressed the issue in the latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1393",
"description": "CWE-1393: Use of Default Password",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:11:58.549Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43021",
"datePublished": "2025-07-22T23:03:32.074Z",
"dateReserved": "2025-04-16T13:49:21.689Z",
"dateUpdated": "2025-07-23T20:09:03.981Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43020 (GCVE-0-2025-43020)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:01 – Updated: 2025-07-23 19:58
VLAI?
Title
Poly Clariti Manager - Multiple Security Vulnerabilities
Summary
A potential command
injection vulnerability has been identified in the Poly Clariti Manager for
versions prior to 10.12.2. The vulnerability could allow a privileged user
to submit arbitrary input. HP has addressed the issue in the latest software update.
Severity ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43020",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T19:58:33.347366Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T19:58:42.413Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eA potential command\ninjection vulnerability has been identified in the Poly Clariti Manager for\nversions prior to 10.12.2. The vulnerability could allow a privileged user\nto submit arbitrary input. HP has addressed the issue in the latest software update.\u003c/p\u003e\n\n\n\n\n\n\u003cbr\u003e"
}
],
"value": "A potential command\ninjection vulnerability has been identified in the Poly Clariti Manager for\nversions prior to 10.12.2. The vulnerability could allow a privileged user\nto submit arbitrary input. HP has addressed the issue in the latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:01:09.020Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43020",
"datePublished": "2025-07-22T23:01:09.020Z",
"dateReserved": "2025-04-16T13:49:21.689Z",
"dateUpdated": "2025-07-23T19:58:42.413Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43019 (GCVE-0-2025-43019)
Vulnerability from cvelistv5 – Published: 2025-07-08 15:25 – Updated: 2025-07-08 15:35
VLAI?
Title
HP Support Assistant – Potential Escalation of Privilege
Summary
A potential security vulnerability has been identified in the HP Support Assistant, which allows a local attacker to escalate privileges via an arbitrary file deletion.
Severity ?
CWE
- CWE-269 - Improper Privilege Management
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | HP Support Assistant |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43019",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-08T15:35:47.981192Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-08T15:35:59.639Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "HP Support Assistant",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA potential security vulnerability has been identified in the HP Support Assistant, which allows a local attacker to escalate privileges via an arbitrary file deletion.\u003c/span\u003e\n\n\u003cbr\u003e"
}
],
"value": "A potential security vulnerability has been identified in the HP Support Assistant, which allows a local attacker to escalate privileges via an arbitrary file deletion."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:L/VI:L/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "CWE-269 Improper Privilege Management",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-08T15:29:03.181Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12715930-12715980-16/hpsbgn04031"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "HP Support Assistant \u2013 Potential Escalation of Privilege",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43019",
"datePublished": "2025-07-08T15:25:34.337Z",
"dateReserved": "2025-04-16T13:49:21.689Z",
"dateUpdated": "2025-07-08T15:35:59.639Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43025 (GCVE-0-2025-43025)
Vulnerability from cvelistv5 – Published: 2025-07-02 19:43 – Updated: 2025-07-02 20:08
VLAI?
Title
HP Universal Print Driver – Potential Denial of Service
Summary
HP Universal Print Driver is potentially vulnerable to denial of service due to buffer overflow in versions of UPD 7.4 or older (e.g., v7.3.x, v7.2.x, v7.1.x, etc.).
Severity ?
CWE
- CWE-121 - Stack-based Buffer Overflow
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Universal Print Driver |
Unknown:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43025",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-02T20:08:10.878012Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-02T20:08:18.601Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "Universal Print Driver",
"vendor": "HP Inc.",
"versions": [
{
"status": "unknown",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eHP Universal Print Driver is potentially vulnerable to denial of service due to buffer overflow in versions of UPD 7.4 or older (e.g., v7.3.x, v7.2.x, v7.1.x, etc.).\u003c/span\u003e"
}
],
"value": "HP Universal Print Driver is potentially vulnerable to denial of service due to buffer overflow in versions of UPD 7.4 or older (e.g., v7.3.x, v7.2.x, v7.1.x, etc.)."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "LOW",
"userInteraction": "PASSIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:L/SC:N/SI:L/SA:L",
"version": "4.0",
"vulnAvailabilityImpact": "LOW",
"vulnConfidentialityImpact": "NONE",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-121",
"description": "CWE-121: Stack-based Buffer Overflow",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-02T19:43:46.888Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12690576-12690598-16/hpsbpi04032"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "HP Universal Print Driver \u2013 Potential Denial of Service",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43025",
"datePublished": "2025-07-02T19:43:46.888Z",
"dateReserved": "2025-04-16T13:49:21.689Z",
"dateUpdated": "2025-07-02T20:08:18.601Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43026 (GCVE-0-2025-43026)
Vulnerability from cvelistv5 – Published: 2025-06-05 19:41 – Updated: 2025-06-11 04:01
VLAI?
Title
HP Support Assistant – Potential Escalation of Privilege
Summary
A potential security vulnerability has been identified in the HP Support Assistant for versions prior to 9.44.18.0. The vulnerability could potentially allow a local attacker to escalate privileges via an arbitrary file write.
Severity ?
CWE
- CWE-281 - Improper Preservation of Permissions
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP, Inc. | HP Support Assistant |
Affected:
See HP security bulletin reference for affected versions
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43026",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-10T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-11T04:01:29.354Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://support.hp.com/help/hp-support-assistant",
"defaultStatus": "unaffected",
"product": "HP Support Assistant",
"vendor": "HP, Inc.",
"versions": [
{
"status": "affected",
"version": "See HP security bulletin reference for affected versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA potential security vulnerability has been identified in the HP Support Assistant for versions prior to 9.44.18.0. The vulnerability could potentially allow a local attacker to escalate privileges via an arbitrary file write.\u003c/span\u003e"
}
],
"value": "A potential security vulnerability has been identified in the HP Support Assistant for versions prior to 9.44.18.0. The vulnerability could potentially allow a local attacker to escalate privileges via an arbitrary file write."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"userInteraction": "ACTIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-281",
"description": "CWE-281 Improper Preservation of Permissions",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-05T19:41:30.538Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12617979-12618008-16/hpsbgn04022"
}
],
"source": {
"advisory": "HPSBGN04022",
"discovery": "UNKNOWN"
},
"title": "HP Support Assistant \u2013 Potential Escalation of Privilege",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43026",
"datePublished": "2025-06-05T19:41:30.538Z",
"dateReserved": "2025-04-16T13:49:21.689Z",
"dateUpdated": "2025-06-11T04:01:29.354Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-6923 (GCVE-0-2020-6923)
Vulnerability from cvelistv5 – Published: 2024-12-19 18:16 – Updated: 2024-12-20 17:38
VLAI?
Title
HP Linux Imaging and Printing Software - Potential Memory Buffer Overflow
Summary
The HP Linux Imaging and Printing (HPLIP) software may potentially be affected by memory buffer overflow.
Severity ?
5.7 (Medium)
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP | HP Linux Imaging and Printing Software |
Unknown:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2020-6923",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-20T16:45:04.499370Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-20T17:38:57.940Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "HP Linux Imaging and Printing Software",
"vendor": "HP",
"versions": [
{
"status": "unknown",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe HP Linux Imaging and Printing (HPLIP) software may potentially be affected by memory buffer overflow.\u003c/span\u003e"
}
],
"value": "The HP Linux Imaging and Printing (HPLIP) software may potentially be affected by memory buffer overflow."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-120",
"description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-19T18:16:32.364Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/c06927115"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "HP Linux Imaging and Printing Software - Potential Memory Buffer Overflow",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2020-6923",
"datePublished": "2024-12-19T18:16:32.364Z",
"dateReserved": "2020-01-13T00:00:00.000Z",
"dateUpdated": "2024-12-20T17:38:57.940Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-9419 (GCVE-0-2024-9419)
Vulnerability from cvelistv5 – Published: 2024-10-30 17:25 – Updated: 2024-10-30 18:25
VLAI?
Title
Certain HP Print Products–Potential Remote Code Execution and/or Elevation of Privilege with the HP Smart Universal Printing Driver
Summary
Client / Server PCs with the HP Smart Universal Printing Driver installed are potentially vulnerable to Remote Code Execution and/or Elevation of Privilege. A client using the HP Smart Universal Printing Driver that sends a print job comprised of a malicious XPS file could potentially lead to Remote Code Execution and/or Elevation of Privilege on the PC.
Severity ?
7.8 (High)
CWE
- CWE-787 - Out-of-bounds Write
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP, Inc. | HP Smart Universal Printing Driver |
Affected:
See HP security bulletin reference for affected versions
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hp:smart_universal_printing_driver:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "smart_universal_printing_driver",
"vendor": "hp",
"versions": [
{
"lessThan": "4.07.1.3204",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-9419",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-30T18:16:18.426856Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-30T18:25:11.685Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "HP Smart Universal Printing Driver",
"vendor": "HP, Inc.",
"versions": [
{
"status": "affected",
"version": "See HP security bulletin reference for affected versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eClient / Server PCs with the HP Smart Universal Printing Driver installed are potentially vulnerable to Remote Code Execution and/or Elevation of Privilege. A client using the HP Smart Universal Printing Driver that sends a print job comprised of a malicious XPS file could potentially lead to Remote Code Execution and/or Elevation of Privilege on the PC.\u003c/span\u003e"
}
],
"value": "Client / Server PCs with the HP Smart Universal Printing Driver installed are potentially vulnerable to Remote Code Execution and/or Elevation of Privilege. A client using the HP Smart Universal Printing Driver that sends a print job comprised of a malicious XPS file could potentially lead to Remote Code Execution and/or Elevation of Privilege on the PC."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-30T17:26:22.940Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_11505949-11505972-16"
}
],
"source": {
"advisory": "HPSBPI03975",
"discovery": "UNKNOWN"
},
"title": "Certain HP Print Products\u2013Potential Remote Code Execution and/or Elevation of Privilege with the HP Smart Universal Printing Driver",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2024-9419",
"datePublished": "2024-10-30T17:25:43.444Z",
"dateReserved": "2024-10-01T19:23:25.063Z",
"dateUpdated": "2024-10-30T18:25:11.685Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-42508 (GCVE-0-2024-42508)
Vulnerability from cvelistv5 – Published: 2024-10-18 15:10 – Updated: 2025-03-17 21:29
VLAI?
Summary
This vulnerability could be exploited, leading to unauthorized disclosure of information to authenticated users.
Severity ?
5.5 (Medium)
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | HPE OneView |
Affected:
< 9.20
|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-42508",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-18T16:24:05.740632Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-17T21:29:01.123Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "HPE OneView",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"status": "affected",
"version": "\u003c 9.20"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "This vulnerability could be exploited, leading to unauthorized disclosure of information to authenticated users."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-18T15:10:26.609Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04721en_us\u0026docLocale=en_US"
}
],
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2024-42508",
"datePublished": "2024-10-18T15:10:26.609Z",
"dateReserved": "2024-08-02T17:04:57.632Z",
"dateUpdated": "2025-03-17T21:29:01.123Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-7720 (GCVE-0-2024-7720)
Vulnerability from cvelistv5 – Published: 2024-08-27 17:28 – Updated: 2024-08-28 13:46
VLAI?
Title
HP Security Manager - Potential Remote Code Execution
Summary
HP Security Manager is potentially vulnerable to Remote Code Execution as a result of code vulnerability within the product's solution open-source libraries.
Severity ?
9.8 (Critical)
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | HP Security Manager |
Affected:
See HP security bulletin reference for affected versions
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hp:security_manager:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "security_manager",
"vendor": "hp",
"versions": [
{
"lessThan": "*",
"status": "unknown",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-7720",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-28T13:38:13.437654Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-28T13:46:40.617Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "HP Security Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP security bulletin reference for affected versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "HP Security Manager is potentially vulnerable to Remote Code Execution as a result of code vulnerability within the product\u0027s solution open-source libraries."
}
],
"providerMetadata": {
"dateUpdated": "2024-08-27T17:28:11.272Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_11074404-11074432-16/"
}
],
"title": "HP Security Manager - Potential Remote Code Execution",
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2024-7720",
"datePublished": "2024-08-27T17:28:11.272Z",
"dateReserved": "2024-08-12T20:39:19.511Z",
"dateUpdated": "2024-08-28T13:46:40.617Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-8105 (GCVE-0-2024-8105)
Vulnerability from cvelistv5 – Published: 2024-08-26 19:15 – Updated: 2025-08-25 21:48
VLAI?
Title
Insecure Platform Key (PK) used in UEFI system firmware signature
Summary
A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised.
Severity ?
6.4 (Medium)
CWE
- CWE-321 - Use of Hard-coded Cryptographic Key
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Acer | vz2694g |
Affected:
d61d0e09d008bfb29bc32532b1b94fcc4ee2af5e8372c6d38722a4e73ecc71d6 , < 0
(sha256sum)
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Binarly Research team
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-30T16:02:49.517Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://www.kb.cert.org/vuls/id/455367"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-8105",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-09T20:18:46.069299Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-09T20:21:06.044Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "vz2694g",
"vendor": "Acer",
"versions": [
{
"lessThan": "0",
"status": "affected",
"version": "d61d0e09d008bfb29bc32532b1b94fcc4ee2af5e8372c6d38722a4e73ecc71d6",
"versionType": "sha256sum"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aspire s 27",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "2bd2bfaf79a72eaca45e544e5c6a5bb842b292bdc229b8975b3101a4013e0d5f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aspire s32-1856",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "29837e239487cc83818a7f40f9280d9692a50376487899edd603494b0f30e4c5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aspire xc-1710",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "cdaa406bda1a58fbe9933622dec218a26f79871d42f0d3576fbf878e51a16201"
}
]
},
{
"defaultStatus": "unaffected",
"product": "c24-1655",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "399f68dc94a6c42030efcd57fd034ff721f860b7b5d447779e7a6a6c99aba34f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aspire c22-1600",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "d938d08543d35d4249a51057c1d9c62bb1f6440af19913c5feffcea47dd3de95"
}
]
},
{
"defaultStatus": "unaffected",
"product": "c24-962",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "3d525f96f63995c51ab1bcd2c50ebb71661ffeca9f78f97cc97e851d0e2bbbdd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "altos r680 f4",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "a2679a9595a104d70bddc024dbc4f65f0dc9d906f30a0d1ae6b996b14246a6c2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "altos r680s f4",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "e5fdaabf11b236c5c7b040d674936e84db746a180ab9999317e16dcb77aeeba4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "iAPLx-DE(TAA30 TEST)",
"vendor": "Aopen",
"versions": [
{
"status": "affected",
"version": "94c6f84946db100b505af8a308f69ef6cddc2e310b50641a6e2e63bc9aed54e0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "iKBLMUx-DER(Volta Charging)",
"vendor": "Aopen",
"versions": [
{
"status": "affected",
"version": "fcd339e12730f057e41ad41228f9612d4954f2d0dbcfeef37e14dcdaf2866e05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-15-3510-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "7fbfd8b03d178e074572dff764f28af98c87c7556ce3837ccb8dfe993efa1940"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-x17-r2-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "65f5939878deede2e1b24a6412ba025b78f45b1562e9d365d97e1c76a32a1832"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-m17-r4-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "f75b595b9ce5e1e25a5d64e54edffdf696251b4f4e860c0d3a03a183631f090e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-x14-r1-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "620848eeadb74a572d6400672aecca35f46dfdc7b5152bb028fbcbf74ea7bccd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r15-amd-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "6348442334e85e8374884ea848685771053a7cf274ccb77559c710b5a00f61e9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-m17-r3-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "413a04c12bde19f1f97d9d334ed57197f0405f9f10ab7154d2b71e5471577c97"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-area51m-r2-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "253743e7a39d0b709122c5329799f4c4608536eeb632218e7f0cbe1f6e8b5db8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-x15-r1-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "4fc54067f263791aed2fa4b57b226ea15c4eb0f55b3797e002bb62aa936bdd8c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-15-3521-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "e2242e4aa3a284fcbbcf2f38a10bec24408f1eff74bb307e699ea46f483359f2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r11-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "8f79d9de33f5f131226a78ccb10bb16218a5be51b2105cc32e38ceb0c8c30e9a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-15-3502-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "62c02a9b5a4d4328ac41c3e3aa7757e64e6c5cd52b9e047333ad18e60d17fcb6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r13-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "dc5912033c5ca14475f2d59ca47f25c8840f362f0c8553d13bb06a8e47c42abf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "xps-8950-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "6982be0bd8e1aed1251fe5300eec2b515b7cab70e761cfb72074f5d658d092d9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r15-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "7e310dca802db0f7a22d39bb2d7d5b79c7e9df8e5698f0e691942ec334ce5794"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r14-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "26a447a94e96fa8d9c590888cae490750c32d5af95faece3595f21efc41c1f2c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r16-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "06a9dffc8fb3edafd1b6377cf38879860a0ae3c87f97258e09d189d291f64ead"
}
]
},
{
"defaultStatus": "unaffected",
"product": "xps-8960-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "0dcd7494f4926fb04b56e9713f0b62eff3a345b626fa2adaf47636bf0bb4c3eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-m15-r2-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "69da86e9cf24c49496529f3041604a6bb1c0c0ab86c192239d31d3a9b92467cd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-17-3782-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "602a23f43b11817ad5439579969753866a54b836f34dfe19342e5188cf088d85"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-15-r4",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "608e410d1c0475dac58b1e8f36b477aa8d9e9f28d30ec89d44b550e36bbbaf47"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-5680-gaming-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "f1075841f54237735c1135ebf92baeab9c0c3f8b051229f898520f5b0f265353"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-17-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "d4ed519bd5e5ba2f027d00635494d485f19f3080d8baf6d711b190323294e216"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-13-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "cb25317443d65ba126174c8b7547c7d2f6c0288f859e2063436eb7b350d9bf62"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3472-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "02877ae1ee43c787fa980d6e897e14546ac193100395bbcc6bc26fdf3077e860"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-17-r3",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "003130dabf11c8b5df286d9584b3174faa9529cd6149513d13c7ce85d63d97b0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-13-r2",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "e6819bd24e063807336994f36e1b7cafbbec46c2679a365dde1b54b720a049e4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "vostro-24-5460-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "d54e560849c716d0ded4b25d9aacc746f77174cc6d3eeb3a50424eaf337c92aa"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-20-3059-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "4b4fd4cc68e48cfbacaf1279ff42ce6e9d37aa7706efffb2a0bb84fbda2aabd2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-24-5459-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "2c6a0bd7b3a91b9e1b309bde7d405812a42abe40001ce661252d81e7cd009650"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-22-3263-desktop-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "13deddbbdccb6e5411317e96bdb045e28c0dcbb7e86ed5f32e5d24b4b54a5657"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3250-small-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "95446bcddec63d36a9f5554815892c104febb73c676a075d789e4b7c69979fa6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-24-3464-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "3ffd081959db4684563f0044cca9ac16d5467a42d40913f503bad8d171bf1c99"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3662-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "5a02b9214bb7ca03030323835a85efd84d369ff02a6baf9193083e2b22e8d0c3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-13",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "fe9e2b75babda09ba22a3e99494198e125188d9345bda2b961f10e98e6c2b784"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-one-23-2330-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "374f19a62abe5b7c195038ebc945528046478ba7fac2b7b429edfaa47122e6e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-17-r2",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "e94ccb36573d53127cfdf1f6d617c31ba8562fbdd4b43e48fe1fd52325315756"
}
]
},
{
"defaultStatus": "unaffected",
"product": "poweredge-c5230",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "52dbddaf0c9803e7f9dd389519b829515abe97dc0fbd9b979230de28880f595d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-alpha",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "f1d2c02737ba96e93892f38c161b3f35fbca79a4302e439e8405d3434ed88fdb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-15-5552-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "73e72a45f92daa7ef76dcf82e6d13113cd9acbd2250d78d2e02232535f83fbc5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3646-small-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "081c82a0748297ca5841b1772330fb6e776c678d425789a66e3072fb73d072d7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-24-3455-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "2fd0f72190810fa5c4a2a3f57a7bce51dd0baa47584b59b7cba4752a92c66ee5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "vostro-20-3052-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "c4574a6a5e1e6b4f3b4a3317b51d75c3764395775f900b9ede99dca5e76849f2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "vostro-3252-small-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "9cc04e65928cf4852d0ae16d55808b42542387ae389ebbd3e42f888638909932"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3655-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "31a7af2885146a94a82ce214a26e4dcdcfa36969aa47a7a1eaf3725fa6a2198d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-22-3265-desktop-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "7c0c8fab8b15d6de59936a3921f85d9e79f710c6c6db6459804b679d82760e26"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-17-5755-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "19967c4eebd851b31936c8cab20f86008c7f065cf93217f6cc82350521cc640f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3656-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "a0e12007dd08b6d9a22fcc6548d0562ea3a966b2030ea9d00c739971e02b6c9a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "vostro-20-3015-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "05b03dab647098c957cadd2a66ebb1401dc5dae51f267351c0d076c239d5856b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Studio Sys UPD",
"vendor": "Formelife",
"versions": [
{
"status": "affected",
"version": "a451ed9d6359fd109f495c75bab2678285265a72be64b3e5d0d5447a0e167cd5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E152-ZE1 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a9638651a2475403924f124552dc199689a45d2e2e59e3dea2b223667dfb63de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AU47 M1",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "d3715136d50fc486ef59fb4aee1d7f06552fdf98423809939538fe905a1aa0b3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY TX100 S3p",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "bfadb1d20541d4c39857e7b295b7ad20ce81d393f014eae27565bc173c1880c0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY CX270 S2",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "e44c2088ee54191192cc690787d74d8ddbfe3fc97c58fb2c42cf8a952784c94f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY CX420 S1 Chassis",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "c27a0e267f18a89c8ba8aadd37786ef8fe18162b60b45fc209bf992b570837af"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY RX100 S7p",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "e71744d4e18cbee18a1fe381a8a83350487baa6cfbf3729d999f85d7b650610a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY TX120 S3p",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "51a9197d05b1aad84546d9469b2c400bd7536eea62b2760a308e5bf84e71d74b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G152-Z12",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ad457250d51a0638880d9cf1df9dd029ab34b36265eda73c5459d8d0460ba3de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G242-Z11",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2ab6af312a78886a13144814ce766a771604755f8dd303381658026304415280"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G242-Z12",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eef3fd99672410b85e6342c5757723d0d3ccecef9805237955baa20780de8b4f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G262-ZR0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f21b8f836105cdb4051d8bb29302dcf86836b640bf048b24f3c76e930b513b32"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z20 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "62bb737d55f4caa082b7ea2aa6f8a59c8efdaf9d5ac5b158cbfb32a6cead8164"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z43",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1b6ff7d60400c7c21a5b28f947475e61abee187627c1ff12cddb25b1ce59ecb3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z45",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "18def9ce5aa6551c1d7e77e9f53e34701f77b89d6b32d41ea050cc94d52941e1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z50",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b14d2e3fadc16c97684a4ae947798bb3a67372441dd7252568f71fc86e98ae9f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-Z52",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "062e3100bfbe635c66feed863141f7a6f2bfcf0b887a5b3d7ae31fb610d17cac"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H252-Z12 (rev. A02)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ac416150a9752dc20107bef240e73c6054af4992348003429bfd97a7373f4f27"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-Z61",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "340cc5c8f4468eb2d36b684dffbf139b4ac4504b5db3993c3c1b5145858c5131"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-Z6B",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0e761b6f3c7d3a1407addf499ff848c493a9d0b0197368cbe858bbc4fa5a4702"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H282-ZC0 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0b739af751913ea6ff42999069963dcf6a1bdd58a3de800ab721d9bdbd59bf0d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ32-AR0 (rev. 3.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a4102b19258804214beb838f61699a7623cc654341e6f60ad986dae805935c14"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB0 (rev. 3.x/4.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e0a3837abd91821c4ad98687d2dc6456b7fcb05c8b672c48f242ffeabfa3e9b4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB2 (rev. 3.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7678e64f7728c059b228ddec74f0918f0544d5193f7b8efe0bf03e8f36c2f5c5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-Z10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "122baff0bf1243b945a7eaa9ca55303469d624d6150d4da136d697878177f1a8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-ZA2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9d318d27111a3c5a2e3a6451103750d70dec9d6e9d048f7e98fcd60066b98aee"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-Z90 (rev. A00/B00/AT0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dbd77ee47e4bccbb2b8af2883765641e9d7c404937da2942637fa1b4b6d4d635"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R262-ZA2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c7f73261e85bdc43932e49254cb8654ed2ce0945379592cecb081d51e5834289"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-Z97 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "076310804e591d1c2d4ab1d53cff0866c04a4189e03e6964b528b8a94faa7991"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S252-ZC0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8927ee41096d71b75bbef2672e22f640a22ae3588f4f44786fff92c70b861885"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ME03-CE0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "79700c28616b906f5534cf45d4582878a73f96eff24f1f894bd04b24c00eade8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ME03-PE0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ac5ec67cafd72fd7f497c3759b0dcf359de8b7db6941120c0c69d5f3eea4bcbc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ME33-AR0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8bdf9b526d2e9e65f23ded60745006c65678d184a258761666d3864432cc0cac"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R143-EG0-AAC1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "630321979d80b22e20ca5fc713b2e3e1a8d9ec9ecaa6e2f814193ab8471636aa"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R243-E30-AAC1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ae9c0a6e84b0c2912eda99c2de4e95d45c0c8feb2a097e02832ae03c74796f50"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G191-H44",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "28068e88e5041161f4485f958f49060d6a865e4beb0b53bafc8f3c5e5e3923b9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G241-G40 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "912834981a1de06dcdd4f8cfd11e7db46ac691e5ef20616d76d859e889c303be"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G291-2G0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0dbbb711ff0879479dc30b9a7116fb94f093e0225b74916f6b79edae90d8fb2a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G591-HS0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bce2bb4589e9ba8bc8029514a887f3f3bb4ded3556bb5d77dc1a38bad564b435"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H231-G20 (rev. 100/A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "819cf98fc21e036b3ae7e6390ae09edcf6fc6c260b22bf6ede0852029ef2495b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-H61 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "190d03dff0cfed20b38ae3270c8bb197b024765963dff6b7730d96bfebcbb24c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-NO0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7eab23785afd939c2abdf53e001e896c67216a6cc75b646d990fdf92ae226748"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H281-PE0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9f715f7b4128701de97332885c28547fe89ca4214de5af85623ab90670fdbbff"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD61-SC2 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "98c90d7d56e82fcf28b362fbf659c3dfd3f987de96d997defe2ef2e78f33cecf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD71-HB0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "82bbbdeed52e95c3f19ad09cc8fff5ea17f9f5341fbef5f88fba478c24e9fd66"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD71-HB1 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c6957244c7417f2ea28889e02d23b63091b6049b82263872ec3a952765becf9c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU71-SU0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "67c4f4ad83e151ebe6e61092bec3153ec269e7be1945dbba0c61091a345a885e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R161-340 (rev. 100/200)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1bea20b7f9327d743487da2db53e5fb89ace6d22f56600b58918737418e716ee"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R281-3C1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "aef16fc11c0f6ddca64581dc5b42b9d6e4ab66807ae7c5a30ccfd8f6774a2b18"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R281-3C2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5077c5d90bce52e6e22371dd64910f30aad69c42aaf9a144165682fffe23c3e0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "T181-G20 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c2b46f65550950fb75d45f5bff54bbed8d4877d803a9688739abd47909fc5f6e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MC13-LE0 (rev. 1.x/3.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a1f593c61f035734a87dddbe547a18a52d641785c40cfd320b0a0802be57a1e5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R123-C00",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ddce5a86b35fcf3fe494169bd1834b1f40f24b1a4938e5239bba011dfb981949"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R133-C10 (rev. AAG1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a09c15eaf24a7804b16fa6fc8e4d16c8ebbc850d070439b2c1ead835f4626dc0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-Z23",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "36b879d3be098143f10fd76db48424f3c3470ffffbe2f828ec7462bd8ec73dcf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-Z42 (rev. IAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b98e94dc0b78131fe59ca6a9c0a142037d412e2ce5fcdb9d0d6d10f102b1d5fe"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G363-ZR0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b2bdfb3a454065b92210cf8a11ef836b45b1db8679d31b45e65a71d1f5efdee8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G493-ZB4 (rev. AAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "930761233953091f36c6f92e069229f7dd6c86555c03315e1cf51f9fd349ac79"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G593-ZD1 (rev. AAX1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c564d83ca92af69a296c473cf748d2a6062883164794856c8be429a652e421fe"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G593-ZD2 (rev. AAX1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "74e19d515a7d2d4644f026bd8ea3ee5035b1d325189d9ff2184892a62a7cddc2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G593-ZX1 (rev. AAX1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "637be0a8baa2b2a07788add89178c5ff71b837b0d7313d31252293e87a8c3734"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H223-Z10 (rev. AAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3d2868fe9d5c6ff7e0397d929f170cc6ff006c5d1b5f7bd99d937de8f93dbcd5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H233-Z80",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5bcc229773a51f96a3904ab181bc621231f881b88a9f59b9427555d9bc868045"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H253-Z10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4978fa8b487795206594ef340a6c846814e02e248aaf6d6d22e21e58c194fc00"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H273-Z80",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7d216a628dc15d65ad64ee6535a8c190260c9616945108237dab43b3fb1ed549"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ33-AR0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2c185f2a4900213d87796a8f1b7ba719d3506961c3587cc6b6c39ebae2067e93"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ33-CP0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "13b00bbbbe69eb17f726a086841770b17b9b5b02c903d165e5dcbc371b87e4d6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ73-LM0 (rev. 2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "140cae90bff7b80c41f0fc69c6439ec9ef3e7b54e408a29dcb9b41bcdf07bb3d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ73-LM1 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "36d2df2564747908c8f8b28df00ea5504783b9308fc76899d0a5ac1b57f43361"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-Z35 (rev. AAC1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6e276e4fdfd0ddecdf0c1df49718595d0c4bcb28850897215b88fa01c239b62d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R183-Z90 (rev. LAD1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9bb0e8c4030538d2b820b333ffa1b211a7930953f30bc9ba206eb26adfa45741"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R183-Z93 (rev. AAV1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "44c75c03ddbd8689b7a5df96689d730f002367d428da0982bf089c8f6909a75e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z35 (rev. AAF1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4f59fb01703b0e6cd5140683e9eb6d98c452b3acb64ab642004276daf49e1ace"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-Z93",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "59c838f97265422664d3508ad13e370351e9f482983d942dd7fbf33bbbf00587"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-Z97",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "42329f479e5572eadd01b94fa8f3f3ae16b7fb4452ac2111f886855e4f52597b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-ZF0 (rev. IAL1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3b999a0a4b3a7336597e7373e3317dd29b91f5510fdfcc8323988d1edab6c23a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO25-Z12 (rev. AA01)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "920c4d1c705e8b80e94b19f2c690d1fa4f25f0f6954db6209ed5118d7927fc32"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H223-V10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c9387dfa08afff4cd1f875331c6eb24ac6758d608976603c7398c039dde35890"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H263-V60",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "76f7ae620a91ff5e8590a2f22f59018e613aeb12b626b886d6ce2f5e4276fce9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H263-V11",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "57be6485a091b1f60afa9a2af34cff051e293d03696c04ba578f97ac38a34d4f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H263-V60 (rev. AAW1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2221d582286ebe04101fc5bd7e353e3f8826c86f948defeb8ac265b8c7ceb8d9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E162-220",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0c8eb9d218ca1706bd15989efc2915e792918b52cdcac38a4845913631f6cccd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G262-IR0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ebf41cbd3da1701755a788922944f1ec7e13aa8396a03611cef2e3940da4cc20"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-280",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5caad5c1ff5d9518017d64a2dc8cb2a83e294520ba6460c0a1b14212688f39a4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-ID0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c2902ae30064150ea9236e92b819a2cf96c47ad73f0439233471b89bb04cc13a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H252-3C0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "436d56f15a1373c341638cc0edd950866bd519e0cb1e0de07ab7df2c59fba5d1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-PC0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "83eeeab2bc322fa12b1ab2be69ba64ade98d999f8e1118ba1d6957c45b52a6c7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-PC1 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "083289beeb6b2d85285084059994d0ae833833cc7284428b6eea303099d99090"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-PC2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "db38dafec56ac3bb8948390f699fddf5a3f3f2b33d0a696d41c803c059a5b940"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB0 (rev. 1.x/2.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eff883c442f1805faa24a44e645413d9c9d3d95e6e0bb5c227124f7eac8187b6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB1 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "43eacbb8f8ffe499f4d0715cf6f798cd81351474abce0e410ecfeed7071740e3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB2 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ede862fa7c647cdd18ab5b2cc90aeec53c35e7f2a9e8d3cc9bd4f1f4e7837b30"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB3 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5ffc9128e64f5a30a78f594923301a6110a8a97c236665f4d4ca7ea28d8a8d21"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU72-SU0 (rev. 1.x/2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "776719490d81637a1604081fa3e9ea7fc975020cbb45103bbe4efc70ed69c6e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU92-TU0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6c0481e584911e1758040140b89593d1839956ef379a6d45d5ac37d0666b866"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU92-TU1 (rev. 1.x/2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "80073632c479a5522a64e14cd9bdb4cb12c3b86eb8eee5c36f63c40c96865334"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-34A",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "da898f000b47ebe799f88868276a9f9a0744ae283480c70b4506f17218696a52"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-NA0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0b851b25b7dfd2d50e710016c21c06a5aab78fcd64597ca631669b7e6344db6d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-NC0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "75adec4e87cb200578f3899c3bd7435bbdadcc4941e5edcb5a3fe3055a8ad190"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-G30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ee788077e078691ba0f587f2f9f044667b3463f794d8f38fa0c96e8b68550703"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G493-ZB1 (rev. AAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "64c336027bad7ec398c64d31ec444c47ec0d0b60eaf89202547967cc1b21fed3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ33-AR0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4270e08e2fca65beb36f8adaf338c4b94d248a98eb3d205d0fcf6a1cd2d6ca6e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ73-LM0 (rev. 2.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "29ed1fb8fd445c86fb30ef02e78db0b5be5213ece5edebf5f9702daaa94f5ed2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ73-LM1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5be6bd89d0e644714c6c98502efcb6e5b90fbdf3101f82cd821d04d2fb11e60f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z34 (rev. AAH1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "00089e4dbac3fcc36ba347ac7d7f9067722601a9a55c2360bf9cae439a52c010"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z35 (rev. AAL1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ea3e4c728b066bf6827adb0497ec6e32ab66c546c4ca89fca8f3113c3d74e950"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2 (rev. 1.0/1.1/1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5e55411efbcff6e593a2de57f46b6040324f35c1ed14f902333a71b6cea38930"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E251-U70 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6c404dfcb9550bf9080bb679ccfba607c96b149772c345ddeab0f881fdd16f8b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-Z40",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "84c011953dcd5981156d4d5488c82f53ee73cc839d3359004d491b0f1fbf2808"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G493-ZB0 (rev. AAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c4dca3104af399295b160bd3ad7d01d38f9dc86e7143dceae68403480d7c19cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-Z94",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "47da1b96a4296aa07edf9e4f54df7dc663e8c8134477ee8718319667073a5d7f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-ZF0 (rev. AAL1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0f77013fe1a7795b311828614ab371df89c88dd7ddd165d17130422289838731"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX34-BS0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c5b7f646ddc82ab730c91e13b52d86d9fa3c28d0b0cd1569fcf0a9b77509d7c4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R123-X00 (rev. AA01)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "876f82d1e8632fff9b24a04be60fb1486a1e4eefb8b20183580874680fc06150"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-ZA1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8567d8f2fd8a32c33c81aae33ef21e34f818159199f0beed6c10dd6e2283351f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G242-Z10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c7e9eff716b9e7000c89692637c58014ee0be37d7ddd39a0c2ae4ecba82e38fe"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MC12-LE0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8e37407821e4af774debc51d6dd492c11fe6652ebfd25febae7a603a7ef69822"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW34-SP0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "add3e41160a5effcd5a6dbfcda45072059e02f5a6fa39042fdbf36ae8193067f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E133-C10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d5900b5a13292df17073793a00393ea8e60a645104ebf8d95c5407674421c76"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E163-Z30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1ecbdd2c9fdb6e9bc4f2e48b5b3e1651977a39eddc6480cc4888462636648f38"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MC62-G41 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dc4153ee0a3333ab789383cef8b0d9760b9f416138a093cd3357370261babf4e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX33-BS0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a0e138096681313a3923eefa3bd3480e6416c73d627d3888b36ce7bb6b2b989f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MC13-LE0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b9f880e1df8c0a237dd9cf607e19287817eb75f59057e8df89ade763ca7b6812"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z33 (rev. AAL1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d18f17a61f21b0b96542a3efd2a543cf87b434d86055e48aaac951f09c53e0e3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R133-X13 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3e3fbdde80c01e9755408922f67ad04834a61cb5e519ab010b151b68772a9784"
}
]
},
{
"defaultStatus": "unaffected",
"product": "B760M D2HX LITE SI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "641b9c056a8fecdc3a572db60e00f0b0fed7722fe9cf377bc4b6ee9208423107"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER7-7840",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f63845840d8dabf49f4a1137c4b1558257748fc26812bd693de92ed0257362ec"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-Z32 (rev. AAG1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7fd571d3ff56fa697a130f06d98ae3d2568e4e3d5848cc0966f4e00617801cf2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB2 (rev. 1.x/2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e01af875c3100fa3d72d014aaf93417317a1a4a4e69c4a28c216c73dfa5e041f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H310MSTX-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "094ba53bd3f96434153ed4c426a2c9f8b62ccab2b7ff60932061f9fa84a9309e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H310TN-CM",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9f5d955a2b3e33b9ba93e98d56a3ce4c997c4234161a4637aa88eda81cfc743a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H310TN-R2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5ad827acb383f51e80cfd4605f8b02186b680f61ba0129e6c054af896dbe6d48"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H310N",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "de983965452c5d6bdbf7e4137ef30782337efded699beb2db1cb1cfab2a9cdb9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R143-E30 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a0ed7595a6c1b6e26d1e930ca3a8c1c0dd619db049ef112fa653b8bf9b026bda"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO25-Z11",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c70331be155ee7c048b0296e15de195158c1215b1ddb31fb842018467c5857d1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-S46 (rev. AAM1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4151a030854ddba555d497a9d2626723d662a9c81e86b39e4e2c02c209ebabbc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-S35 (rev. AAH1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f8c33896586db20586273c8378d4fd18e49a4db7b6ac15333eb67536536c40da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-S94",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "70ed5ca85b768ef6f9bb36baa9596d07fb259c775b457464c138a7494f7340a2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO25-S11 (rev. AA01)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9ad9beef2a8253dc72e6bdd37d76bd54fcae482fbd3308904d87dfaa4df281e2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z54",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f446b6d7d932602558e4abdbea9a9b826a12d27c535ca6c2d0bafa5e34ec3864"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R183-S90 (rev. LAD1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9cee49e6b444421c55798f7ce7bf7a1eebc6d6f75319c2bcb39bd11b4075c71a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX34-BS0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5380cc7bc3d652f0d0316dd3225fb45f1bb054e9c568b9c8e8bf9591306cdbaf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-S45",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "77b27203150cbb0b885df35e361b1a193163316e3f315be4e7967312b097aedd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-S30 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e0c5fec105a86f8b7ffa77bd983d3ed0b54cbc65542e0ffdb9aae29cfc2ddd8e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R133-X11 (rev. AAG1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e8f28f55ed2fb648c7237e216e5c377da45e9f6d6a746605515002aaf502ae4c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E283-Z91 (rev. AAV1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1fee6620306388e1d23dba7889b858bd56a091cf04ee68db32639e14d9b87a14"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R143-EG0 (rev. AAC1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "672102a1648ac9839230ff8c818edc737b01fbe92250ae0db8ae2441b257f5d7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BEi3-1220 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "39ea2372c5af03dacf3a4112895e5bb59489497c23828e38acd4b4fec35df970"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BEi5-1240 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d34f17d147062c8aa223fd2e528b8c10c0879e8ee2d6064607f45e93908a935"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BEi7-1260 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dc45a2e1fd0112f5deac4678b7b093d4e233256af8e492104658c38a5ad426da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E283-S90 (rev. AAD1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "059d906408ac5c7daa81504d9e9057023d7686c9383faa48ef6f195d4b32d997"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G493-SB0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "394bf746dc6183441ea4d034769683c92eb999195fe6ab6e1fbf10c4cd1aed32"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H263-S62",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d733c74eeca529ae54b842ea757213532781db14b38c9222f4eb34be5ac7e1b8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-SG0 (rev. AAC1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "35ec23b26774c9030a1deca1b66837805aa7bedd6518d5be506681f2296b5e17"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S453-S70",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9fb2a464f53ad26c1bab90ee2437c0c265ef6d0faf419af58baca323c6156b7a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E163-S30 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a7ac0837b77d7a91edb4e5fbfde127eafe1601e858a6312af9e555646de46480"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-Z20",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "abe7715141d75d5817b2456105d037d116c441796c7a373dbf3307412e111bf5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO15-Z40",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b0766c740aceae7f71543bfb22d3c757640e714e52f32a17a3d42f9d16d39383"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E133-C10 (rev. AAA1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2af044c4474abc534ec6da84e1e6415386421dbc897ed2946efe131840de8161"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R271-Z00 (rev. B00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dcff49fc24b1b8cf02fce97a15b0bc8bb19c6979df21136007c677ac3b9023c7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ME03-PE0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2bf55cd3046c8fb548063466ea9eb0802c4401f3c04a13f9ef693fe7c23570ef"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2 (rev. 1.3)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8448a4dad1df740fb0882eb8533c40a2227e385f9f2f07a546c1d2e6020b7cbf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0dc9159572d38d754e168d1290219dc558cc72e67e8fa72727ddd43a5ad187e7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E152-ZE0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "83d24271a7b1b9bba7070c128edcc8b4d6a5e7c96caa920baf5c014efbf6775d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-Z93 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "255ffd2b1161bb8a53626ad3920c40eb5f0f63cb1d5710969abf31797f8771de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-ZA0 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "85f9cdc44ed670c411f0892b769e91567f9a81bcdeb92861fcf6e2ffc7773f9c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S453-Z30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "92c197c09f8aaa2e20427f649cacd1484ef7a345040f54eeb3135745b6f671dd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G262-ZO0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "efc056c3caa782e178b7ade2333316ef39a0a6e17157c68a61927b3a045061e9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-Z6A",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2ac696517ae7da9f3efe81af66b89b5f7b24beb6e09aca06e61e454915070a3b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB0 (rev. 3.0/4.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2ad038a3b127e95df1fc8fa61bafb96a113fe0093d9ecee66db9ece973c5a257"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB2 (rev. 3.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "225cea866d8c5843d32d6edc97764b69b05707e47c9537e6e6e7f4ac06775816"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G152-Z12 (rev. 200)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e7969888310f2eceb73544fd8108eda95c1a3ea62ff57da93c643bc55b898f50"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z40",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d31512a9a475071b6e14a03aed7c5286aa0c622925d7a840bdee7158a7d9583c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H242-Z10 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1096dfa8e4e5f5d2410eacac73c51bd1b946bc4d2f110a44e8c33f53d0182eb5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R152-Z30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5297e4a26fd8ed927abcb2438a5ac2a4e35e770d06d272ed77b3d847bebb11fb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi3-6100 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e81cd2760e4d5090b1d0da86309ba993256d88a4abb8065ce83266bcf4f0ca34"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E283-Z90",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "40d4956a427564b83b0c1a86f1c32510feeeb5282eccfb211bd29f0a0a7767c4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-Z30 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "58a47d7e153b03ce005686aac24bfe31f405a7cc4670b826ccc775a839de7ee1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G262-IR0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "43dd7e97fc6fd1fc0ac1ef601c00eed9ec9b5d5325243fb8c6f0ae3517fce89b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-280 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5b7eee5f852ce1424dfd476d8713650e528fa359f19e551b7adb9b6a12ad467e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-H80",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e79fefca976e762f76a8ce36494928dc2ba039de02b69659a87b5245cb27ac2f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-NO0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d04141fdfff53843c10ef247e885ad9fb62ffc58c89580718ecd2b102a590f30"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-NO1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ca65772cdd5fef0d287957d5a6e308fa1126b9b40a2cd701e1190e852ce0bfd2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-340 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ade7666d9e200c0929260025880128674b63349911f1d03857a42cf753f10b80"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G291-280",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6917b15d532856e0c0f7cbfc3501f4d5c273616046d94695e01ce07303f6011f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G481-H80 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "53a8edb12be4b79c231d3f950e20343f20f3727a6544504259639fa6506f2457"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H231-H60 (rev. 100/A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "56289ef76755acc7f4e843b3ee0f29ec8f063f113f640b157d095d18a866d874"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R181-2A0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "01c95a23c9bfeff78ab2b6d77ca33e6a967cf624d1afb5fad393776c79a25920"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S251-3O0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "303797b38020f7b91381f887954f819112509c4b855ebd75c7a31dd227acf1cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S451-3R0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c9a2e7d55dcf6e3f7537515d2c6cb0e36770a5fbea7a01dafe4a90359ade90eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "WRX80-SU8-IPMI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "249510667c5c37bd25d731655d7dbf18c5fc2d8d377c0c2326810cda6d9c0f46"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R292-4S0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1dcce1bfce8c75c3fdf8a307ba7f6d0231504095e1c4e6bf2166a4cf75df29cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-Z93 (rev. AAF1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dcb8c9ec0cdddcf94852ac34e952a349af1ca970d825dc239075286875a9257d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNE3HG4-950 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ed3834eedb770cbb44be9357c5b05d9800ec9577ba3eb6faa3c47460d78814ee"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R161-R12",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "523e9d1bf5710144e36f9535141955dcf9a3d075fff092f6b4d1e12ee2eda562"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXBT-2807",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "16f990d85b5a42e9b762a08f69614b0c6e3f5c1236364ca38efe92a5dd729bb4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MB12-CE0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bcf637c0c5be2018d76681b66661d1e6f061c2e1366124f4ef8754c074f8a95c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z30 (rev. AAC1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "92780ca87316f207f58c61f65bc8f702fbb2881688d9819dbe8ebbbbed6e1f67"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO23-H60",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "955038954a0d1463be658fe518b6006f9fde166b67e9007f3befb9cfa62e5da9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRR7-4700",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a462c1a73072f541b6719e4cdee351d44a7cb3593dabbc6809b5b387d909eee5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRR7-4800",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "424e8b46bd3feec4aae4ec33eae1ca8658526eeb66e121adb244d3c322dd005d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRR3-4300 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5cc12fd686928c97fa7fbfda17250579adc4e7bd11e46e88650de5ebca6ed03c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRR5-4500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6ea44803e9b188161126374021e9d845136edd676d33fc80e5f9348b8d577a87"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W771-Z00 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d07d7094aa0dbdb896f8d3dceb093ea8c1d72ee0009472ece73190d2071aee6e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MB51-PS0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "372c9a6f86f60d7cef6ae2d2ee7ca0d55df998ba0a47468668c6758b3d3db725"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 UD4 Pro (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ca8a556421eb318b0e5901085e97c448f1646a1636e34ec6e4d76f4a3d61f601"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-ZD2 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c8ab653dc8a40406c0a8a4d71b56059a2f9b7c7ab9e883290acd071941c7bc25"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW22-SE0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d369b68d0c38afedcbb0eeb82f2d06d486e9c0ce212ebe3b0d9f8dfcdbbbf5b0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX32-4L0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "78ce8406e3b09a3450d41ba11c1dae91456f25c796441dabb52c7b7e261b3a69"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW32-SP0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0cd64d233ea4db6db2a90962d2888f4e5b967fbb24fa944ccbbfc2c02d5a358a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX32-BS0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "40234a98894a9855db1a921ffe9d272caa1e5702dcdd14afc82f6a91753fd460"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER3-5300",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a3ab1a934f5806b5472f13257771924e3fcbaed289b2d6a860ec2fbbfd2d0c11"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER3-5400",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "06879fa2383284b0222247992f7d359bf5d0ddcebfdcd5b42a20ee5f46a8473f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER5-5500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "68f88269c87ecb16f9b7d9269005ce505a3498b9e3440054742481a2254d5aea"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER5-5600",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d98134626baccb58d0d97613efeae6d504b112a4f8d8849e2599ceecf55f7fad"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER7-5700",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ec439231fb2d3491a63b173bda078a128bf02b19262b3549f3a799992442d9e7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER7-5800",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7704838038c24fa47fadd54f19c5911fa39823ecfb5f451db59271112a07e777"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BMCE-4500C",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "43cce322b194b9be7bedb247098e8b691878f238b14199cfba11af4422b3464d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BMCE-5105",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c412ba0cc85278e93f349b9fae6011982f23f8f3a7b6539a36d90b551ae1006f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BMPD-6005",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6f14b4087af44921d294462fb0d65259f18af0cc23b7ab1c5b87773b9c3c13e4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi3-10110 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6626703c5940d244a87f2967f0c54f4a5a7b53597dd92a0b561f28a2f9a9161"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi7-10510 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "af98c4cea319d387751cb356a28390fa630a1b2f66920a3202b37e0acb861ade"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MF51-ES1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dbe505cc1f3a4135628b7e22c7fddb99bf3ee1d46f82a84219e8cb0905c20ff2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MF51-ES0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d27437e85db58b607bc173e844b31dbfb8b949ea3c225e13377ae942572c4611"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MF51-ES2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9bd110e7a5a1e1cdd77af3702309d98f748cdec6d25a5e76c04f63417e2e6a8d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-Z50 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0b2bd8851706081fb9e310e5f4a7a97c3a0bb32eb7167a609e602ba6cec1ea89"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800M-D3P (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "19c85b8fbc25322544c775c9fdcee793a563d51b32ede6b29c02248e0813f42b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSRE-1505 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2f18902d7afbe8d900b6552c2d7a86760f05c4698c1018053b2fad97f6ab51f7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi3-1115G4 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6f6c034629c0d8df05227f4e7d85d02d8fa52d7fda0940fd4f80f62a23be06c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5-1135G7",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "baddfacc85e4aa97915493c4f66cde6002104bfc10ecfa3839c4fc6e32597953"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7-1165G7",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b191f4293202c488ba673c288bb5edbaf506a9835a508ec38fa705797738c918"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PH",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a5013d7b2208a6c2d1ea75bbef06711be676430321f4b275140049d6fd53f8df"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PV",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "60d70e509fc3f7c1da701e5195218f20e297c11d2dd4f0327ea4d25732c120d0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z20 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e0ae28d4aca350a31f66402f4b0f46e05e4aaf77adfc813179a7df20c8f4b148"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W331-Z00 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4f7c60d69e3c374da221c2ab2d2393794965f2e0e1cf296f5a64d4d77299089e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c5534cc441ef64739b9609ed3160f296cefda8faaae992448baedb01e9310be7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "82f181dfcdb973537274d8fbf4ad83d60ba8b7315bf99def64780a8c29c6a843"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 3 Pro",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "810a53fa70ab5b27f2dbe92948b79638dc87fe6015f94c41501562a47805e28f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 7 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ee03798b5db2710360c33566b2e61b46bc664ff8a25b257bbfb620c332d70f2b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 7 Pro (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6ca7152161d4d3a65a2d4fa707a3784811bbb7507332f1c82662456f5f76b5a5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 9 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "14d6cfb20110768c3da503050dd9222a2514aecd0ca49f2c08e64bf6595b0cd2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS MASTER",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "326280954738ecffd23930791fec6dc0ba2b9774c85886b98d33723974c3427d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Ultra Gaming (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "91933d348054953096135089baa7b6ca61dc43e9fc25dff45c9fb4dbf9e8d606"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Ultra Gaming Pro (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "22869435dede4b52f75a6b82266b67f8930857829185f97bd322c3a72a8899e1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 DESIGNARE EX (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0a1aa3edaeb6b389a08cded1ce036ea9178527389ca1549442a35f8b1b2bcdf6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 UD4 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3716034ddd789a3e8e1c688a477e4735f228bc3acfa18b63e719d7cd1e8fedfb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 UD4 EX (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6fbe2e27bf4b4543e39c88a4702f487b15d02a47b04e006759cfb6432d82fa0b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299-WU8",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d15d9bd6d7980d27bb56848643aecef336c8ff0a695e155071b7dafb1f75d08c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-Z60",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "826f711b5accbc542c3e33d607f1dd10edfb3486772975f204aa2de43bdb52fb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ71-CE0 (rev. 3.x/4.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c0c4215e8207d397914a56edf50428f01ad3676c23630ef7b8c06cf36e45a7e1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z40 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fcbed542b232be01a0ed2d52dcd3dddc101fafed3da9f3e3aa6b17b652e640f4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G182-C20",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e133210fdecf2d57cde25b0bc706437210318e37655eb22a97000bf27a02c177"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-ZA0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "03e23d40902c4e68730e74ddadcc716f46032774001e1b6bc606c5294d4bacf8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "390cd14f2be9ff14cdcc90a9e705cc017bb2535e66b93859eddc233425998937"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G221-Z30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8e8b934cc0bd3127262a9e52fac754d64abe27c09902a78acec81c0daf883f77"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G291-Z20 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8d49dfb69b420390cf13ff8f3a3b3ab88e5dcd46a182c4ac5be9868bc6278c35"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ71-CE0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d3b797002d243cbed1182569ffc6b5e5f6243e59ee27bbabae7362fa80be6e91"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R181-Z90",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "24be564cb337350bd9cbf409cd95f29b760e1ff872f99b27379c40b533e9f2e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R271-Z00 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "99f913a3f88561d7163bb1ed79380dd346897e577315eef71695aeb861e82579"
}
]
},
{
"defaultStatus": "unaffected",
"product": "T181-Z70 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e42a49d2674808c57b781e8b3d78613a143ba9797d1a856ccd2a62302a49520e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi7-10710 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "14c74b9b80e71d3302c13aea0dfea3560e1452a55c698c20e457c5b495154443"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi5-10210(E)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "56430f2f4f9aef4e50f503dc8397fdb20b005bf38a8b9029c43e3eed56c39229"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-ZD0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bacd1c945c9ff1ecea3e29039ad8b742c6d040e5792bb45008c1b7f664fb36bb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z46",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "31aa7ba19f6edb9472a3da22793803c265a0cb0b7cd7979db56251c37edcfe5f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-Z90 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8cc6129ba23848fbd65b91a9b70999aad19d3b7a6d168066cbe4a0b759fc5a5c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-Z96 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "605db3a5cf91d915929488803446e5a51dda16d661e76840b707474d2df79069"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z50 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9b0c2aaaef88b38db18e4efd44b2582c8401f9a17f2c54d0e1f07d2c94a9a5f4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61M-S",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5fb07e319cf6d523a488d879e7eeef3321e90fbee049efb642b34ad2a32611b8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-ZD0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "25555956322c0eaecf58fd759ed9b0b7857f9dd149b02de55e2f5eedb291117b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W281-G40",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f7c504d3d3907aa4c7f70ca1fbe1fed7e73426eb987b9c5e2f6b31d42e801af1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW51-HP0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1190d15905ff8656d2d0601c388df633b1646fd585de4fe871fdf93fc23d35a0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z53",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f5f61e3f93c7f6615cfdc26efce6a83b3188d697e2243643d08d10dfa9de8afb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z54 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0fe0c762e396660fb30aeddcf5a5928af864eb44399271ed975913f36e46190e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5-4570R",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3353c109a69e6fdd86adbec899e2669cce724bc35db33a86fb0bf1c81a508c2c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621 AORUS XTREME (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7edc3eecb5d5ed515e06f8130d875fcae07cb0c7bfaa2e4cd8d86862e5ecc256"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MJ11-EC0 (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3631995d059e336863527f1511894bdfc61361bc0691a430b3896fb94746aded"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-E6010N (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c9c8f182cf3b058d12bddb039d8a3f3686d1c325c9b2719ec5fc8644e066274a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3000",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2da499751e8a5446ac8445cee5b95f6bf75ded5c8ec6738eb67f5c4ac2081c32"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G291-Z20 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6d6107f0d094fab41eaf6073089de8a0b24bb7a66c5851f534a8f1d26812c3d2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-Z60 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "edd3eccfbbc2ef2ac40e723697f67a346fca062ddd6679c5ff8cfbb91d3b6afb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R181-Z90 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "575fc48c70ea9ee40f8016ea2328ebe790e7e556333a95b9b511be466047f668"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-T60 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6b636c9fc0ec84737f2238365e71c23e9227695cd5ad52bf40dbe8290920fb60"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7HT-6500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e9bc71596a97741893377b2c52a13b5b2ff0a7b6f985af40725e0755d2c537c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621-SD8",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6ad23c1fab3f0a2babb23e7907385e25a06801c2edd50d108e5b08f923855a8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621-SU8 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b9017e90f6c47a9d9560cfd92206c4b2e624cd91cd7f0680fb75dd972ef9582d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSRE-1605 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d72f64d5a25b9088f7fff456d3783c2fb0e7926cd4de6469c6c3f57690830907"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming G1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0455dd8b57341d5667d4c4dd71767321c3f72770f84db4e46f93d31e50b376a7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621-WD12-IPMI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0215ce75b3629651d0c64b0b241095b58f0af921cec3022c524d531c22f1385e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621-WD12",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f528dbe55aba35bd4e5d55fe853afed41c54d78719765944a5ea74dbc062f4b5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cc7b733f36b027823b3f501864d74397d308f8bc169149cca5307855234a4527"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1900N-D3V (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "19b4ba1388707838d0de17b6f2e9ce01f70f728926ab7e2dcc0566f6dbce8e90"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G211-H4G",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9546a8c62b6d285172acc0ca17340040cd18ff76bfe5b9e7672824e948f7331f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW21-SE0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "60370916ce5edea7899125ad1b470d59cc04b0aeccea1ae5474f78ccf187e4ae"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW31-SP0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a89940e207a6fdd61170536d0d8fe66b4584c38a804c0df15d23c0cf30d49e35"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R121-340",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d2565f697c692df559b665d0b97b3743c9de07c0ffa83b0fbb5b86aa821e8622"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R121-X30 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2ca3df4ff24732338397d64dc81509ea5a7c4b979ca3f2ee6c7446d690355c52"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W131-X30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7fb3aff9b87102cb3535bd80904b7252c40ba4f556d9f355a45fc9003cb29e9d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z42 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "09d1d8dff99b19615f14413d6ba20891819d481b12667452786510209344095e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G180-G00 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e32576a5522533c1914ea8aed13f238022bf60eb6fb86ec5393bc8ee56cf5a06"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G190-G30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cbb6d5a01124074eda2161e53a5128e0d0d8eedaffa55b14c1dfdd6fbc5a067d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G190-H44",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bef72cba124fcef35a3ccd67b94707f20c2bfe2a4f4d89f3497affd72b8c2a73"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G250-G50 (rev. 400)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9424cd10408253ab228dc2125524340f5ca53759e3ad4e996e7cf0320f41884f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G250-G51 (rev. 400)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c17b5d0b9140f95f5317619866739be362765e6165292cb183f539b6758f34b3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H230-R4C (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "59a3fe40e2896be666fd2712f7e5176ab10ca9335b39bd04fa48867ee607c066"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H23N-H60",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d4fc77114a472bf1902a66a35f51a11689446c8d0dc18000717a5f74ae6b3a2b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H23N-R4O",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a5cda726ef82b73f9c764e39a64ceab32e4d6e238c3019e06d3b7f2218d68ea8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H270-F4G (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "934742dd01634ef45d78c2a7f9f3e89a0db2cbc7baf994570cd8b64fa4491da0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H270-H70 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "499d17336ee9e6be59a733507c25f7b343933bd728f296f6ef08af611d0a8ae2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD30-RS0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3b9ef069c1c67a9caa29f8eaa915605cd0bbf1edb735d92abf2c4e959ca4a726"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD60-SC0 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "473033483d404754621122afe34dc8f8f47432bde116cfdde03ac38fdf2fb054"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD60-SC1 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7213c438e3f07e82dff82a5b6cdeb5f80e8b82ce6e12fc377732a8df2c527bfc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD70-HB1 (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7540b3951f0ddc6c1c1f4eaf062525f55a1c6e862022e4a545530895510d772a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD70-HB2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0db641b3a89e75061d6af75e41e365cab69a819f6880d4bd0a0f4ea7960fa17e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD80-TM0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "15f2bdadf43e6d3731df0693552d4aa4780ed958dcbe0ea4ef80bc27510cdc85"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD80-TM1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "298d5755fa084d9268d09063222030993755cee31f9fe5429323b830c8c3f5cb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU70-SU0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4b5caac23e6866a9bbfd7962a5557ddc9b0369cdce09b664910b35bd66e690cd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW50-SV0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cde8f07d2e7d14233748df612e113ce348140090694b96c407053fe4e6e1690b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW70-3S0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f8c314404f2801dc3b04cce95fa27a97f58459f9d70c8e3b03bbfd45bbaf5e40"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R180-F28 (rev. 152)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5d3bf4c8452e70a4ee31e25cfd555694af3cf64eda965fade0b21e8a262a2c10"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R260-R3C",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e6bc9c983e21a0cfcb2d86a9dc88c28e5ba33387acdff81bccd6caf780e4619c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R270-R3C (rev. 143)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6b6d0ebe479ce082420f5412fc099860ab825450e58d96a6b33c5013ea061864"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R280-G2O",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "efaf5f327a471776f0a75a2b8b7f963c8ab72190be7f606d51a0c04715dafe70"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D120-C20 (rev. 230)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cef953fd8883203ef326a6b195a90328ae31ddc10736afa171b617a906fab77e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G150-B10 (rev. 111)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fe702d3ce5fdade4ab194ec43fcf6f0a070123ab547ae49b9cbaec33c474dfb0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z51 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4dcab1a378bb4cc541f210917c563b95dd678e185b4d0dc8483b175cbf9097ad"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MB10-DS0 (rev. 1.3)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3aa61cde7b1886fab7e60e077bdb39d0a94e3c451593d13e87306b88b4e56a80"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZAPLAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cd755796109542b3da08826c56951102e5034c76428138d1a6dd4f1ca29955a7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BPCE-3350 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b22a7a1693d8cb2deb608f8e3ab366f5eea0e6bdef6ddb03a86d599fb2efdd48"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BPCE-3350C (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a42535bbb37725951ac18b0fa9b5771454ce707bcdbeacb8120d0aa0eee0cf1b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BPCE-3455",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "03662e2e512cfe18afe431d968d60e944af5f7514f840754864ee4cd97990130"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BPCE-3455C",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "47b54ae65d44b227a3bab252fcd465df6e6d4875cf2511f1261f1c8e5b196e1a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-EACE-3450",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "421dfe54ac2554e627762ea96f454f95f7232f3f238dc9f5d5fc96bbf284fbac"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-EAPD-4200",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c6009503816a44e0d4fa7d0d74ac7418b6551e31e58bab97390711055449e52d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-IMB1900N",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cb4e9aa8b2416ed2fb7593a3c93d5fed07d24d1f349761a1790deb97778a565c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-IMB1900TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "93d6ae2ede6573f018ca1dccc5b686a0461a0d662a353511a0b420a10935267d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W42G-P08R",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f0d6176199b56171ec12bd663025c664b2bf3f8b844bc90edc8dbc3cc062871d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MA10-ST0 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "00f354e79abadfb8b4aea11bb07c3ddc16f00b3055ec8c221ad4d69538bdeffd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11HI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2fdb64f2007196150cda167f3eb121cedba80d75d0b79def30c4d7155ea0b2a7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-GZ1DTi7-1070-NK (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0d274a7eb05cebe468e07b2e6692a11c90f222d18077b3d058fc02b464046265"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S12-P04R (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "25b628eb776a57d9fa45cffb00f8f3347cb9d7c2f3c33712348b85c3ecad2d4f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R272-Z30 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fbf652a641fc3d847c148abb65130f7eece7a51a9c6607f1c403a8bbdde6ce48"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7HG4-1050Ti (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a0c57eb7255f99412b62429f165eeb1f8a297c26a13eb6d7ddbee91e32dbce6c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-GZ1DTi5K (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f37453e390737ec297686b784da5aad11acbaf8375d377fac533caee996c1d66"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R160-S34",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "898a0ddce89b59e6993ea651b0a0d4b54752957b63274dda75160674fa0928f6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R181-T90 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c02c66a7d393e7bd8cf757197bbc6bc22fd9f9b38a8a1068166eba97bc5b4a29"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11BM (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "410a0aebc3826f029ee6a4cd0c5816eb0676fe99a0b112e8ce55e8b2f3b49e6d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11JI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "05cb527ef122bbe9ebe54d4678686e6a21b961f16392841f5f0b0bc3882a184e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11KI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "945d5b0e567bf5604ea9b12fc7f3f3bb12ccfb1935b9de78c9bc77241632fc9b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11TI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7796142d4d8a09c6f416d5b3cd452caa659cfca40992683d7f8af55cf4e6a7c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFH27AI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4d3a05e1006e9d5a1045ea65277cc4fba148ab4533ccb1b6d52ffe54edc7fffc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "J4105N H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3d1879acf606abac026703a7fe242feb538192ec6f01642ca33ba6d6de55a725"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3160N-D2H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bc5aa15ece1e486f4b7d31c5ba6d45382204c115e556a6412d751e25703a4a7d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi5-8250",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3584936b2dad0ff3ee3d6b167442d39dce8400e1016267462827ff20d15dcdf7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-SBC4100 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "873e676d25545b3d6e133a2c85cedd5a4627a11f67513e54e6a99e812e7618cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi7-8550 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "591b486bba979b64d20fc90bd63a5991b7df16b5aab1447de888e3d6090f1086"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi5A-7200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e13105b80056966dee303194e6eb7e2f622dccb80f5fc5780100197d43b871ea"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi7A-7500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "002c5c88a393a9da6b48c30d64bd702f6b50fef07c32f45b7c09f40fe2f3f2c0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi5HG6-1060",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "289cffe9f81f1e9a9cd087bc529701a9343084e499684caf4d34bfe8db15f3f7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7G4-1050Ti",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9d8b09f7fdf906dff7d92049fa20921927f3cfebf564455eac78ce2518ad03a1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7HG6-1060 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3835eeda7653120a02ce98ea98ba75ebce53ac1efabe3b81d0b6dcc9e611d1ac"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi3A-7100 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c5697a205b0e85c8f31e3538135e32b72ca60d1652162c30007d94ad079096fe"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-EKi3A-7100",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2f7481194b1e0a153551fbc9e68fef59f463882e3fc0238673ed6293715366c5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-EKi3M-7100",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c1cc2040975c62eabeae3df92e63b2c1a22c690a97edcea1576f83e975355db4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi5HT-7200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "47a969af17efdfe04690233319d36d12ff820901d0817ce17846281e7d5f49ea"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi5HT2-7200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0aa384720b8e5c0d09b9b0b14cf14a105e4b607681f778bcaa202412e666bdf1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi7HT-7500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f61c63e919c797c1faae135458e0db89f288a1d05402380823562f34452806be"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi7HT2-7500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cb0603d8ecac9baf7de500500990ad0a7e9068dfee69f296d62de549f69f9b1c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi3-8130",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a74d2353acccf98743271fd296b2bf6f1e047cca1fcaccc2fd9095a7f72fba2d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "iTXL-Q170A",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fa7e7ca9fd48d608094d5f56ad6f0166db7be91862666abbb6fa631055b98f5c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7A-6600 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6504f61ce57f6caae37cc7c56910267d18a1db46e6681178b6807f0e26ab966c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5HT-6200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e649eb460cc049ddac440fe93528336fa42bdd9cd7a284ad9a2481647b57e75a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7HG4-950",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b772a8c72de61e4821a04793a16c8dc8ff7b354fa2a0bff189d879df254c9f1e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7QG4-950 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f4426a3de06ca8015af5798b631afe601a78a069be9e70fc818222d9b4f679cf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800N-D2H (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ee21f7397347f3b42d5229b41f9d9a6b4be739419f6f2bef1c3eec8f5d3a17e2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3150",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "66ff6219a24fb3662b7b3d4fb1fb7937649dcf052cea4364d4c9b178735807f3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7H-6500-LA-IW (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9e23a81c581d5e6c351c2cac1a944ef5759271739f6150c3ef6857bfe401ae62"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-IMB4100TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5abc359c698cd90030a597105c4ef899e4ef56271b9e0f43c843408b9fb53d33"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3160M-D3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cf2df7d9f1ff5f087021f7b47cef6aa3efb47cbfd639f730512bc630e0c91f81"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7G4-950 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "210688036c5ecadc5d764691d511e738ff32146bc69f26601fd45321c65b0c7d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSCE-3955",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "327e84e3cfce4cb086435232d033a20ebcd4b95cd5aa4b85cb92206f44507170"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSCEA-3955",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6e166fd67041801b0481c69bc271ae73e0657f1078442b5740b09f6774128e01"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7A-6500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6662b3f0d921aaee11ecae2893271fe861524620b05540e255d1e364aa65abb6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi5HG4-950",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "030031c6c1b9422a56ed44f04efa2ec84fc8a2de254f24d14989934f613d12b8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSI3H-6100-ZA-IWUS (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6399b690346ae7ceda0f8dafbca5acd17ac4d796619568a51cc8e50f5b630b42"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi3A-6100 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e7049738618fc298adb3099074b3419bcf553f0e54acd9ada2d611fe64925026"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5-6200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "044e3800c05a232d4a8821edc28aae7927474c8814a385f717010ef9b12a5622"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5A-6200",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d86ef77e6d28671ef838b314840a4ff9237798c058244805b3b3bc01010db097"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5A-6300 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8ca806b8be055f9b5df84871c469279930b34b89de515068b1cb30bfa9c3cae0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5H-6200-B2-IW (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "40f56a09ded19979902613399e9d6c84cee02b72b7114cabac53629fe2c068be"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7-6500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5cb60622a0063c6d261c5693fd423d7fa44d826e8250812f50c7b9a28921712c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3150-FT-BW (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c754aa67ba523b595de11270897af05dc22907a4fce3f4880bb372b1e18d9164"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3000-FT-BW (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "19a209b004631abf16b5f6abdbe22b3e9578e1f5ffc4bb94b6601fb612ae47f1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-7PXSL1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "663977d4a882f59c8a8791d427ef4431ca63f89ed5683a4cb6d61006f1b1c8d5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Gaming 5 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4260703c9695e6975438598d85f4046bd34a1f16f77fe797b22cb45b4428f83c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Gaming 5P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e5ddbae819b82a8237740cccc23cee00844fa79a15e18e6187854b29e7e81a2a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Gaming 7 WIFI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b767595393d045e4adb4225856611b3a51848a17495666be273823220a0dd165"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Gaming G1 WIFI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d3e85abb0959e87075f3a91e0048163e92c1831edf3c70a4d85f6ebbe5d56cfd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Phoenix SLI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fe510a8d06c948ca3e699a51d8f60bc0411df8056124d5e4a993cd526da8a0a5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-SOC Champion",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a85cfd3acbec43f545c8586b63aa52622d9fd00303bf80ff3890012032699ea7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD4",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "95eddffa23bfc032d7d65b730d49a4d87bdaa93e349fd9e30dde6a450b9a9bff"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD5 WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "36b023bf42423988805835e5b7c48af57c0b487c7308cfaf5a7a0ff75e3ae8cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD7 WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f93b61306682c563bb68ecb67dea64f9d5b86a8e1c7cfa7fb2b4ea02a15146e5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Ultra Gaming",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "90818dd14d621360badea1463f975a367952e2a0d43e7dc73401a7ab0a2d3a1f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99M-Gaming 5 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e3b8e6db2e08d8cf93dcd44adf437d6a6fabfa7b309702b35f7ddd4c1790734c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Designare EX",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "71337bea704f642aad176d64c9f64fdcdb9f38f8107294a417c9bce7a104cdd4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-SLI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0307e5ffce3a9981334d7eb19b13caeed61ab8074212943438b4a423b5d2a9b8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-SOC Force",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "678f05bab483e1cb9cc2cd51415c920bb4307b31ff917dc46cc44c6c2083b5bb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "295417e80fba51a322a02a7e4c35ab04af54a48355711066339743e88e3922f1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD3P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "51c5cd38074336d75c166ad86a2df881b53b4fed849b538e3281d1bcf0502094"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD4P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "27abdc6ac0e50d6d6ca0e937c0a7ab1efe8d2c53c46532b68f0cb1a5fb955517"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3160",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9cd9ea2490848b03659e0e7dd7871ac815c54080e5588a530afe35cfc1ed585e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150N-GSM",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "01b2fa505a7a377587ea64b20e1a1570eb7f6567a9204ec972ae478998236a0e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MVBAYAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "86a0a4b3efcbc51e14a0a307a0efe343c7a7e3e2bae3a6e0502869f610034ead"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYAC (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "073a6246ab57b038afd9050e2dd017aefdde6dfad5d61b80bb2d5c3c71134b73"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYAD (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "be9c2feced70f810a5d08ec03dd8e7df75f9abd066a2ee30ad82136f355ceaf7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYAG (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "305b23937168ebedc60ac6756010c07e4588c48e9fe4694fb935945dbf4be6ee"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4ab2b4adb933a22cc5b3b3739e315a68c9a9a3dca20b1ae7f27713c0279f6670"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYVA (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f96a77ebf7806cc05507582f25810237aeaea30ef819dbe90ab2227f8a36ce8c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8bc76dc04271ff2014eaab3560bbe3177cc08eb3337f4f512c7d44b98a40d1d9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-HD2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "713c6e95151ae02f075d0391a12e47fa2aaeed199379377bddc00590ceda1795"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110N",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b66a10f650f73f5497b22a2d45d9c0bf4df9a987668c4d617e62925c5c26c388"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110-D3A (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "447d66dd22c3af2bbdeea4b2a766cb3fa4442466d0c02d62647de9f3683cd6c2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-A",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a04064b45ec7d0c5b6ae123d779095e23315e6ac1a150d4b3190909a2237603b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b1276f7ad8788d3db650a672e6ce6785d5c3922d2bc5aae554ad1b48b62dec5d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X150M-PLUS WS",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3ba7690791f1adeaa12e45dc9adca1ee7f08c99bf5f1c51961c6975d1cd14770"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "efb150fe9825a88101d934fb5a9801f970f6e734e758344062d37152e8baa1af"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110-D3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f5f374f38948ddbde29b9673cd70ce05e27af9f3be23a7bc086f37f35a68ede4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-D3H R2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ec7f01320c848a88e89d3db821f462448f62e5ae65fb4fd02dc3a5602ad1eac0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "577535df524a000747a1e15828af3de0cfe6865b0b20170d024974d6b5b81160"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-Gaming 3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "901396591f3682b308f9cfa279cf1a7f8d4cc6622a9ca799e6b5e1d5bf769f2e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6a24bb276e5c9b05ac4cca0da01e1b381245a0d217efb5190543de6ec41b2505"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-WW",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b565acd86a3f4e294d606bf6c0e42eedc4b7361f4adf7c31ee4a806b54767cfb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P110-D3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c544cd0b03384834b08b784ec0339e2b91a129ee56e7f4881101a10af567e6a2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2V DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8b02d988ee00fe78039974032b856c56e741a4594744b4f6376cbe1df8271226"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBSWAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "41bbe9daa5808a1c5b9836a654d6c6d312ed7034c304f963af28d13eaad84340"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-M.2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "18216a9c0fedbfa3a8c8cb3380845ff086beaec130296234d58d02d24fe051a2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PT",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "210d858cd9ce7dbb1b76277fd580e1c71214d1f7ceff46788efda64e817fa95e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2V",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c80df47ed107f7ea4eca4e15a55fce37f1578b985ed45131b8c67dce9ac2bdad"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110MSTX-HD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "55099b8c517078f75299dc02afe1f09167bcd7760c0f46546cf4f8274b54c465"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f5fa2136e6ebb55d5aa3c0bcee64bcf4506a7854ca10fb5a43b8141ff4bf1275"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X150-PLUS WS (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0bd8853cb934be142b7edb2ef31a2031fb348a6ecea1db37e466dce25bf7fd6a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800M-D2P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a08c05bf56e1c4e4d180d69266bbcb244e7e2f85259d86c05bfcf5593cfa33f9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800M-D2P-IN (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "98372c6dea313b0660ae2f1b1c80a8a5d7e93ce07010621392faca75818c0fe6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800N-D2P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "af4026ab4defc142e75d57ae35e7ef4492fac8ab6c0cc55c6de47f3e21f5ac24"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800N-D2PH (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b2977acab6438edeb2af8a4e3d0c353fd89e9b2d47082b528c3c23fbddbdcbe3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800N-H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "464be29c2ee1a3f706063374be13365d0a296776aed73fd0c8506f1cdddb568a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1900M-D2P (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f89741fdf7f21d8670407a4b8038e75319d73486009e08a795632e94fa27df82"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1900M-D3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5641071fccfc0169979343e131d614caa71a2b334ffa45d1ee10817ccef73d8a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1900N-D2H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ed85051f384bd7694f0a86322c705f819cc18a0ced71d4e3c3946b37d4f3abe7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LASL (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2c0e4341f91bcedf78c301778d52492fa304380cdd15bdda725910cc6709e033"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LISL (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9a8e636b33372a34e9719b8b20d2073bc56f549b64e5af83fe617187a51b97c1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99P-SLI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fa52c6150c49a84699bec9739b84f5a2c073f4f69b1bc84028f3b2cb15b2167f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper B7",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "92311971e888a24238c48086febf47b2d0820856e514dd6308575291b6de4e48"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper M7 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6051ccb31aaab7240147a1fdf9b8f444c7ee4bde73ffb4baca63b02bc77dea81"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper Z170 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3df7b53ef2284dd2f3385aaa589f87f2e3fadc93d2755e28781452a273d999ec"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150-HD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "878450f31de9dd84201895e81547ada2085ec94608d7fb6bdf84d73dc3b98538"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d1d3adca998106090f4b2f08d6c50769e88e944ed640518d23f8865102c2ec0d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150-HD3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4cec11820244f485baa7f61d50e60a514b0c5aedb87d1a26cd6b6fb153fdf9ef"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D2V",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fdedaff9a18229027689f23bef37cd8424e248412137bbf710fb6163eac6ac43"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D2V DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "da480d23fe57a6003e41f8c88e2aacbade99186f0b62ba4561663b346e9f96e9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D3H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5fd1eb03f29343e1ba70dce50264a7143129fe60bde396f6e3715330623db8de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D3V",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f2da89fe72acf6892b139fd4f7a047c30eea75cf5c572da6f901511658ae1522"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-DS3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b3148d78c2efd368e986a43b19e209f2ad4817e8a4ef41bb79c57ec7b9dc09f3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-DS3H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "086d80a421ed4cc907120e6c96117c3b69b9edaf2ef6951fde7d3dbe6ea4c878"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-DS3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e69ba3bdca3335f01b749abb84c702f6f926eab3e4d6ca70dd5ab84c3aee24a2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-Gaming (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "639cd1a8d45af689d2fe1aea44b62d2110146b314f39be8a5d472e412842e61c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "94a5124370c2d66b38a568b3d8be4a98dd8d2e25313b68506f7753c4d60be97e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "825b4bc9bf807631611cd33434d1455bca3d412b9a03463fdd1092c54d5ebbfd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150N Phoenix (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "12886ede3cef3c93c4602ff26519a04c9143e903b103006ca3805c3df2744c8c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150N Phoenix-WIFI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "330f761ad2d43d72a4a09776d76bdffdfdd88d4ddf6002e0056e2826828372ab"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fddafb4af375516cb2f72c9308852c88738a66d57af9deb08e9a10f1dc983499"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-D3H R2 TPM (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4ecd2f653fab0c6dc0ed24c68a8f04c454cf8dea68b58d149e9d79758aac2c54"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2 DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f71a5cfc0646d85af2847e6816752e81f3b4d2a3ea5fa94516aed9464eaa4024"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a402dd098614ebc89fe70642661c52da9ed9ba0b21627cff4868defc97db0274"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2e24220caffd6ba7c7e1835f12740073a9e3a826a1ffb9bca210756c224eb99a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7802bf1fde1f8771ff7165acab0474471598a46df398d7db84adf911d2d37260"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2HP (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4b0a77259b2af63a9704b094688237ff3c29fac1c011a373a0f2537a8a543d1a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PH DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b73d5f184db4524883fae5f01e681f52371964740bd6fa957998ab4d65537732"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PV DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ebd6b43db01ccccaffc4a08182e03cf6633d5371aa69c82f7300141277fe7d7d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2V DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "756777ea660defef2629b8802bcbdd29b61020fa8ae8cb07045a7d5f991f3508"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110TN-E",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "879f28f51c3b235744352f0808b6267258131f2594f3ff85a6938401e73eb9da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110TN-M",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "50f77912004b73bade539e1c3983a7ab78984b8590a64d3e030ade4352c49eb0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e4a209b19361c13d7a18fa41d8a257a22f6c806bd62f04dd24cd77abd7d3134f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-D3HP (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2e1be66c511bc8367a2b1ab41a3ca60cfe46648bcab2d5f1f5bdf5df14de1c05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-Designare (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6ea3c21e1aadbadfc2e9ac0860d94eb87e6590ab37f98326e00b9615a13a6208"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-Gaming 3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2cb69c081c6413077fd076d7230ff816931ae65bbead2f94f0b12d33e1861c9e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-Gaming 3 DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eacba20ef05b116d70c6344a54486bb7c23a131d7c897f5399b9a084a5bd5205"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "38643b383b7d51cc53298693e108cc293779dc43f254b2e2b17f66a80f9e4175"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b3cb86dfc649346ea7ed4c8ff117ca91b59435b9baa9bdd8e6f2bde1dc1b1124"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170M-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "60a230b0a5722bfbb364b6d64ae3e1b1cccb6161bbd6f8cc034977f4d283b4f7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170M-D3H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1c6801b8a7920939facfa379b6141016651601971156e426db947ca40b6f1708"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170M-DS3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b9ea15324d90a1b750cfcbf964321370a56b116b44a0cbee2035cf11ffcc0ef8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170M-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "78bff3425a6b42b846508850f03a040c22c43566947ac1d039b431fb80a31451"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170N-WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "03299dee42886b0856629da99bce9cedee322b80bfbb89aa6943913d2da15e03"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "523817566d04fde3f7fc0215b4c4758243319affa5c1819e4f041c290a36970f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-Gaming K3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "db4668c191b9266a2afbf974c348885a9d10a3e1750d1e100418aaa896a5a103"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-HD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bf0aac3f13b0d68c6a255735eaed4000c7e5f09748818746b4a1038f0be34f78"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-HD3 DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bceea4f950f07347b40c579223456984c0515a2cc94c4cedbbea3c17e1c459eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-HD3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "20607b0f670b297b45523730d2204e46603cb3c65f47e6cf8293b07b7b1178ec"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a34cb81eac53b0800c2c02d2984c0960c0d68a22707869befd4af3996be42e7c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170M-D3H DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fc0eb68179f1363c19896c7cc043021a57cd45a3492187829b329474c361722a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170MX-Gaming 5",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b87e20d143fef2fc32233444070130834ce5dbbffe06409cb537e59c911f49cf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170N-Gaming 5 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "209045f2bba172fb91679d4319cfe548c24921f1e28dd9f887e3a78bce515e7c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170N-WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d67b82421d81df8f3d64966609e3c963be6d0dbd87df531ba5f3ef0bd61e5353"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Designare",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c061fffcfd8d7e38afb97fb434afc78d39d22bf9b02884c7c1b04487cbb7dea7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming 3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7b1cb9593c0c1890a7f1e922777c206012f2f1ded7b3339d66fa49efaca44c74"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming 5 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "438bf66c9433bfe1ba92452f5f7eb1d46cbdf9af9ab3c3d1d4354e902fb0f257"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming 6",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "25917f5dcd5f5a4c2daaa9fc0cdf991b365e226856202b4e5e987d406e6af95b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming 7",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "75468e84df86d3133927f5c08028dfb6dce55168c99ec9fde08397f5ab0865ce"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming GT",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d40ec6b83d08a885cb576844e609105e15fdc4e48181dbc861e2bce0b657b59"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-SOC FORCE",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5c25f790a4eb79b4ad3c4ceae05329c0878337257a6e31c276ff7aa5c18accc4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-UD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6389e5f47ee85c43b2d9aebef2e0c8a9f06856fabb148496a8acf251cdb3c1c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-UD3 Ultra (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a01bb5e701b3b847766d027e7b9bed8e7bb05403ca0160734bc73c93fb77b6fc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-UD5",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "260811f239a5a92f4a894f52c5b7218faa75c5765e3db17a4ee33530bbfc1295"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-UD5 TH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ad921f429c443cd2a73ba3373fb6407a81b4b8d53b3fd5cbea07ca847ddc75c9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Ultra Gaming (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "464643065d45eeb1c2566dcce90bd868313319547c91d46e3cea78126109d374"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170XP-SLI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "32d8482434dfaae6405eca2bf724939194c8740da638c9e3e8b760489b2a1128"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXBT-1900",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6b0b62e4ea23df186b7bbf0fff342ec107596e1fd249721eea75375982054535"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3160N-D3V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e03efb41e61ac04cb14a63c5ee5a71d3deeddb29426e38eab1c68946d60e26a7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "J4005N D2P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bae6e219e1ed8e8164382c4f05db847386c5f2908fb2fa453066aed4531310b4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3010 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "aecee44ca1c8bd43d65abeafcd5f0085e1165d42baa953808d566005189746a9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3050M-D3P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d4c55cc53de9adaaacd9e70527becc4de1cb0b39a605791601fefcd0156ced4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3050N-D2P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c717a5d6b61b22bd458dbb497dc5abad9e30fedb668810e558a46f994a656435"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3050N-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "63cd7d4698c89b720c73125900f4cba4b8b1c2b962064280a93dc9ce2a0e9549"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3150M-D3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1c4cf96a2ce5bae121b0594c2b41664510cffcdfc4001072f2275964c20fe12e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3150N-D2H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4685e5a58d4cf84102460110a5fad72931b1b46eb9f71650811832f80580bc0c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3150N-D3V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b0474259effceedf7aedde543afa096fdcca74d9865eac223b6a91b4ed922310"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3160TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5f53230a65454b8805179f246ac3c8b36bd274ae0051d900cd04890e7b765555"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D3V DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8ba0474e2bdeb945adf9a819854cde336f3cca848e1ac41e381aaf03d397c7d0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X150-PRO ECC",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c6ed04464891a4cdc3a25ba34d3cd44599bd118ed953c68c8b63f11be2dc83d3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X150M-PRO ECC (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "764d56cd4e5b88fa97313d5eef173bb426aa27aef5d81794eaf5b9c1fdf38375"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X170-EXTREME ECC",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "35f6ab275afa77bb30a5672f32b196d8c76208e48500d7f381e05f8f12e400e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bbb58a67574c989b095f38c9fe031cadd5a709235d6e0bfc9a206f98fd5318f0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-9SISL (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "493437a68a7a7b46b645d46660e17c3b6599eee86cd06f592683e56963cf9a8c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-S (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "554e7be483afb47c81760179da5199ebe2f59a97b7146e50ed42f35728df9c5f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68MX-UD2H-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5bbd2f88bf68b66e974356e0e49f63b83fdeea8d148da445e24073d8012c0c3a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD3P-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b7981e34bc8994973c48a18ac01d6b075f092de47d35fc62fffdc503ecf081ed"
}
]
},
{
"defaultStatus": "unaffected",
"product": "EL-30 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "485b963baebaf9e0d0d3f0438da8fc3a5e74cac6fc7781e732df5ad0a3be3eec"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61M-S2PV (rev. 2.3)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9e2baeb611484b3c3460fbabe2b48ad91111e9a0cd7d1f189ab2d0438a69b3dd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi7-4770R (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "73f5c64009c9b8ce26c13399584a65b73b3b5201475b04dd9621f5433ef959da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R130-134",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "923e61ed9ecf1c37848cbe56822ce753f455fddf25c1eca816f3ac04aa46daa4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R270-D70",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d5844b2dc05f8374705493e1d67700d0421f63c27ea10070c60f1871dcf540c6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "P15F R5",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e112ae0d90739fa839e6e29687412b5669a2f23bbe2b418d96b65ead135ec349"
}
]
},
{
"defaultStatus": "unaffected",
"product": "EL-20-3060-32G (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8e0251d4518373ebab7aa1dc037d732b5c04e92306e16a8e8ca1479df0a9ae88"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MP30-AR1 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "586ca26deb275734620c0b80c8d16dd86538bff6116f5d7db1fc10230d775eb0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-KMA1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5b5b834775e9fa3cb50db4d25d9df7849cf0f13011a209fc53c51245aa963856"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXGH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "984e1178ed45439578fc0b3cc2787cc8f972987c087fc5b4762ef5f421cf5782"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXGL (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "240c0e6220a07f27d4debd867f2a1774a50be1b37c3f53a2dab272a71280af4e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi3-4010 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "10cef05010197e635c330548e99ad98827223f0c8eada8a6e5a95ac7dc2880fa"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD3H-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9387c8f1b5d856bdf0ce43c88413c22f98214768708183bc610381363dd269d8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXBT-3825 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6775386a28b32b93d1853880a8ccf1b916a3bedaf7ba4d34f2a64904de792417"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99M-Gaming 5 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d11d8f85507e54952adcfbb82d5d58ecfeec7674b756ba62c8e1316d9a1500de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G210-H4G (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dd75c90a2a81a34fee2c17a6e72b8ec2c93120fbd98c437c4648ac5fd78b6af1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSQ77DI (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "030615cdc1d2e52fe185f8fa8e6e1c1028beca283a6be9215482a39df1418622"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-KMA3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dcac97ed60b61b1991fc9f499fb3bf0e8594d49d102e76a988ea8933d099d396"
}
]
},
{
"defaultStatus": "unaffected",
"product": "M9M3XAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1d3295cec309f0649ecec6952824abfad776ecc1f46199a080932b5e99ac206b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXCE-3205",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a080c1d64fb844389bad75a733e3b4c5483b07623276b114575d5cba32170869"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi7-5500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "14dca67fdba7b20c48d3c16446db2a648c79e5f94712afba6e720ecf04ba5223"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B85TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d817d05c86c92a00f00e286c6c26cc52e6a50019970a71d98aa07c53d9690c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H81TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5ebbac1eb55e763bd4efa47f6232ecbcc62d73645c3291e00a3d5cd880898ebb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H87TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e555305c3219cca7d7b8d5a667ae2ef454aca7eb84341f07e1fa8288cdb38359"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Q87TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5f237b90cd70e0f63c0414262a0af2fbf8456ea78252750ccc6ef7fe59cb8774"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi3-5010 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bc4bcea45075ba867a4aadd97494ddcbbe693b23131bb52703d3c42b41340719"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5-5200",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "39b90d14141556595814f43afeb015cc34e75acc31d23b0c505ba00d1c4a6a7c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MATMH81 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dea93336a790f6ce8a80f451d1dc454eaf29b034a38a802140937b3166c4d450"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZJ19AI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "51ebb3341dae5033164b3b45470115f49f327e5dae5ab111df2a59bc04afad8f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H97TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "882fa77c019e12dc61165308318657941c1b15c1259213e78aa035017fd50445"
}
]
},
{
"defaultStatus": "unaffected",
"product": "U21M",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6fb97ce4f81eb4d83364b9377cf654a6f0e8d9271bd8e1e9f45f78b07f838172"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXPi3-4010 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8a4342c4bacccf07bdaf52b9cfadc8789c37092ccc0c414e1848e4d0317d01b4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-SIOPS-J1900 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ddff03dbd491004d20587de561e976bc8b5b5366723b51d3f59dfd1892b9dc25"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-TCV2A (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "70c80b940abbafb0d631870322b5f7c8e306a2063097493ab471f0ba8ddd228b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MQHUDVI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "092c46188af77b69b4c19e349712a23244ec7cdc885c2e0150a8209c1693c95a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-SIOPS-4550U (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d3d7862eb46bcec3f0eecb5ec94caa94456def40792a125cb9b7912625be5973"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXCE-2955 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "161c97b5c0ce6cc90a70034d8de30b18d07c43e50d5566c1802dadc967cb05eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5-4200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "05001b41f2adc9d6c008f12f9d1d9669225a2366c9a05f6bd19d420cd5b13fc3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi7-4500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6f6b51ad77bb7963ec455923fa731323ceb72af167a0a40b8c2b91696301bae1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61M-S1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "19e2a33d2a28a825fb89e7dfda9609776110876b204c5ff760edf716cc7c390b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5G-760 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "faa729af295c234dfcfc5ac4ab91c8c255c1b054c612b9cbda1fce33f88b4d51"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5G3-760 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "718662066149651d1b7506c7582df2252c555428481b1821829b4db25e2a836e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi7G3-760",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7452bdc99e762f3b54571e03c1b6ab0873529b798275149fe0a8bc057929f8c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXSL (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3448017b88b33e3949d6c18876be32e506d827f65de6c425ebf82f33a2c3f502"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXSG (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eb08694cb68b19cc7bd0bc323a46e8ce6de5036078a61dc8827ee480269c88eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LASH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d7f1a6c78df7317f866866e74e881d91485ef816e492fdf2a6fa02b940629494"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UP5 TH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f0e7e5b4689bf7e81db1b56185b2a1186d31a50f1cfd1c9863a0746f490ebf3f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXSV (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cc9b6fc8540a6abe60b8966ae6c4217180cabbb3471d12f93e3c81dc206c8bd4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSH87FI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c19f30c4c9a444922cb61cf136cd48d9674d2134b98e618f6e7ab9654eb7a7ef"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-D3V",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ac8e4d6a033b6a2d130404eb06e193b248a76308d4a82eeb5736d4f251af6826"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSH61DI (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ccb5cecbe797ba2e130f297ec86bfbdc629ebaf919065e50d3f8911cc05b3a1d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-XM12-3227 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c67607819bad2d7abfd1d47eebad947f9920352c33b96db61f9f25c05bddc7c5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f5502f7f96b9ca121d3b52a1a804c877839e76e3dbb45beda100bea672067d26"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-F2A85XM-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "104c3173aff7cbf07c72956516cdc7c34e6169604293aec90e86bcc4384a799a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d4c6ce9d730179b7a5cab37a8744a2ca588c9a2a8b8462b62d2c96757adaee61"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77-D3H-MVP (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1ca64768668cac95b2c49594df5412492fd3e84a5ec279f5e5782d9d08d641e8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0d28128151819a06848aeb241f3dc4737d3a9b3918b739f8c512085af375b368"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77MX-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "32b1eee6b2e1553ceb902d17d0ecf5534034685dc8c2863f9ec99d2dc587bb72"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77MX-D3H TH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "26778248ce3156bc2d3e70461f079d1292435aeca9ea2c6ef0e536c979845164"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b51371864d4322ca5c584cded0f6bbad11dd01cf498b841b270ede1f03497137"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UD3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c27a0ca23c6d3ee9eea18c0e700f33f13c568dc209341b8ab4b64148a235c70b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UD3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "023f4c9928786909d9fcb2143edcb1ce9a20d1b15cf281559996f21617503f91"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77M-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eeef50c6dbb27c9ae8bbca0e2be73384ba60469957414bc2943892ef28836b4f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77M-D3H-MVP (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3c50ff8443f151a8022b4934dc0e87cd74d500719b586c82bce2184bac3ec2d3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-D2V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cac095d827e58ed8992e3eb2bc4285823c8378247de15d7ddc3f97c79d275f8d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-HD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c3d754d426defee4e705ab9b72862764a22a64f316a1f8a2563a72cae308c31f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75N (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4a901cc6ab10bd1546d8453bd1bcf75379880ee549329c03ecfd4b445b52de99"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77-DS3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "58d19c2ca76b765809a99f0eb2227291f4f51860723d303f9ef0cb20d4d19dcc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77-DS3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "98d605b3578ac3b7518f151c24c937455b204441ba806ea244f22e54c03af2be"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75-D3V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8222535124cf1bf77c3af3e6ce3b3a942390794440b01f8d2fd44b4e416b049b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "33793d37f2415d724c58c993c2ad6cc67d661253b929165f6f0ab0c88c8325c4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-D3V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "235c6f47146d2bf5dd20ff3971421489c69517be3b467ec1a2b6f7dc0f2d8a94"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P75-D3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1859a1e462fbb1db039e99f7cfea16e6da59188ad37b313181211ab2c3d70150"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P75-D3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "901658f7361b4d15145d07de99b9d921d7293699a15479f086f4d1a00fedf089"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-F2A55M-DS2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4be0b29ff5fd55d855e5529912b92acea24740eb7fa0250ba01a44824c4685b3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-E350N WIN8 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4fd09df247091f6c6ead14d012325d14055ab38095f5c4d8c258352f48c2052f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77N-WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7e95d1a64976573e5ed1c8c3466e24037d33fcfbbd9f02d1ae69643fdaa44d7f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6UASV3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "00d23573a79d5737cfc6a1094b12e22c8a8601618934193dba2242f0246af559"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61TN (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f19c7fe7e25a9a41b4065791fa390b8d79ceee0cc7fafae702a92a6ec0e86696"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "506f5abb01dade2137a4b8d3ea42d1127f24f59f96339e77c59883571ae63443"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1ffb3921b21ffdb876b2cbc7b6ff939fb5168efdf5ceed571d2d220e195fb150"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77N-WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "25c38be153f85659377f63b4968f5425bf7e8d6c99fb695eeaaed973939bd943"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper M3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bcd286446cd358474b492a2c9a4d49eab652aeda52c0e69ef94b1cd12b7579b5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61M-S2P-R3 (rev. 3.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0e26169fbddeb0ca9b8283dba44d571b554487b5dd9348caf84fe9d7a6a20dcc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD3-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c0adc82a52cbe367efed31279d6e1ea3ab98311db49a68ae149e4af9a70ab67a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67-DS3-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ff5f5836457aa7fd0f02d037d0dc23b5c5a49fef8f7360268d7276e577060256"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67X-UD3-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b8fb25742a7753c0f7ebac50e9e3d6186ea123dcd0e33eb0a64abc111eaa7728"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67X-UD3R-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "435e0ba0715afef2a466835c19105c6480a35f921af59b863f2c29ed2d1de0e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68MA-D2H-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e8d1572bf6bb0b658f618c735322e6c1aa20d01b79c9100e3d177b6c27ced480"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67A-D3-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d36182899b2c912ba34f51b50bbf228e1ec367b0fc009d20d34e4f011f4e9fc1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67A-UD3-B3 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c46c76138b4cf0a3407c3fe2844c11fdd5c0c2c4d335ab58aa0b0617a6f13f33"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD3R-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "50d3dc2e80333527177e5f5e1dbc06357ecaae3fa2dd1d51272a906ade3cd7e1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD4-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "beedbc9f64d20973229b584d965bcaf2f8fdc4a88c4bc202eb5e9f5565c85fa4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD3-iSSD (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f615668a861c9d430afe7b40f42f352881132d193d16426951563997fbdc81da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD3P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1d3552918dfc84151da3dabc0687a4513f1dea9d6879d53a8b8646398fc462e5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD3R (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e4f33b57947d45b3e43bdd7bafd68d2f4c799fdf0b72a8a2ca61319ab760ae67"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68P-DS3 (rev. 2.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5823dc1fbc95d092e02519c069c4fd111783428757b969fd8b9dbac1009fe91e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-D3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "384d9e1e3cad82b7841f33115dbfdf38589420716c8c0aa5a190971a44aa39e9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68A-D3-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2065b895916edbec17057603ba98779b4bd10cbfc3477a87c767a36fb027b76a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68A-D3H-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6c9d4c8caf3307da9b1d6543e00682a3cddf1dc06c41f0f973355cb9c8554bc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68AP-D3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7013aca3c062f040cf9d0448f7e2892101b30e5956915c8dc3a53c3c2aacd13d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68M-D2H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6d451499ebe6d8dd621f1c2ebb00b87dd01f7870b791e682b66d5f33eb01d8b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c676efd7e6c8bf4a7d3da8aa51b2b564d77c67f6d2be68b25232326166e0c20b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD4 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4ae3a48e1a715461671107f9e8e790cfd1c4ee4d2b8ddaa50b140d67622b920f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-C1007UN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7b2aaaa9f92c0e6fa23a59bdda27d5cb26e8fdece26bc756893490d3ee657a4b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-C1007UN-D (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fcf7c3d07e1bf9f1347e48dd3ac6e45fc9492648985a06394ab6568a7a71e262"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77M-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e3b619d396378c2e6bc2f550cf1c55cd17e7091fa4ab90761f32582eba28884d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper 3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cfa61511dad005aeb4ab01678f87169c7d509d59042b2fd33e8b58bdb34febe6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6UASL3 (rev. 1.x/2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7196b64c2f89763d2ea7f0f106d06352ae2c0e17a83fed2d10548e1aefa39245"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UD4H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3ff3a0cad413c0b862ba515d60cac0e98e373e199f0d92c79a77ebe6fa6a2247"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Q77M-D2H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "43216a565586f1c49090c7982e6f3c1e41b179e430d7ac0c47c8ad07308a5bc3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77-HD4",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f6cd8446d78da9720f06cd360a48e9b6bdae33e342e18cb05420adb78fe05858"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c1209a2eb0b5eb9324e1a8ce11c77ca141023b94b988bd1df4db390dda4c275a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77P-D3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "00fa676c6d12df8a48049f39b87e3343769356e880d2abcaf04ab1b679c450f9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UP4 TH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c5310894b9a2bb510f37c49852d743d64343a698436ca22d9b7a44bcf20e447a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Q1742F",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "350cc51e5e7fa472e95460eed374eb1f9a43ea4e615e2654c26a9da4d83bf529"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6UASL1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f86f7ad9ffbc7437bba6bcf99d08b8de38f945bedff00c2d35362387077eabea"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Q2542N",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3d6faf2792722d1b9fbff087e4d85ddd2a4f9922a7848ed4db99284687df3b23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-proone-400-g1-19.5-inch-non-touch-all-in-one-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "642290f1b37e616b64b3c6b60921e24ddad599a38e67cd46a281b24c1ab62bb3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-rp5-retail-system-model-5810",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "2a090cfc69ebd88dbe2e2e9c52a7f3a75b8b150478e30a752c5c0f09129f3bc9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z1-all-in-one-g2-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "d0a54ae69192d2d0289b2c9ae33a6ffd0a0db78189b41b032e18a3452c878eab"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z228-microtower-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "5174331d57cf3392012b00a6de381ee7a873f7fbd217bfa3e744b7dd6136807b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z820-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "b02cdd16e398c2f31e9641d27d99865c404357136f857a1e2dcf2f7479b9457d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z420-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "05e89382e73afb280f637acbfa1029e9107dd30c78df37b6a00f184657f5f2c3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z1-all-in-one-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "b6fd5cd3364bdfa459f040c1693b879bbcf508513124bb95b5f36743efd8e73c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z220-convertible-minitower-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "cc5a9c2d4827e9b1501c2dc0a464f580d4a2d65e4ff83dbab548e51839339d06"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-prodesk-400-g1-microtower-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "289f0fa72150a52f2b71bc6bf23f343ad9c1c412aa5977e89ffde7474562cb18"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-prodesk-600-g1-desktop-mini-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "a80a5c395fd3b28b0130d4579dd3e462f9e38bccb2a42cc5245cedd70b27ff0e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-compaq-elite-8380-convertible-minitower-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "455164a23e14f8cc9567b458dfb85106294f149f0e446d2d8b4036551f894cf5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-elitedesk-705-g1-desktop-mini-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "1650cfd06bb698ad3cecd9e0c38b0de04d29f9c397492ba70b985b033e2458da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-compaq-pro-6305-microtower-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "44988d41019bf5c7989b71e966b97752f60c835ba2300c7d55323eded97c21e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-elitedesk-800-g1-tower-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "659078fcdff1dead57cd05eafa0af4de667b52e981d1b907f0d963b41902dc7a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-10w-type-82st-82su",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "69dae6e64125b37fa0ee09f5cd9bf3581b3244e99d9b4651395834f9eef021af"
}
]
},
{
"defaultStatus": "unaffected",
"product": "thinkcentre-edge-62z",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "b04cc879ac09941e714a8ccce371111bcbbc8d7b1dd1ecdc823de09fd2dad7b3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "thinkcentre-m72z",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "4438137139edb1e04de7e265e94444e1c87316b0821178285d87763f00bcc5df"
}
]
},
{
"defaultStatus": "unaffected",
"product": "thinkcentre-edge-92z",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "e37c7b66aef1c9702b08f3d08a41edf3e4617fc94a17f318297506868e1d254e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "thinkcentre-m62z",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "76c5461e86a33095c4191aa02ccba85cdad5f24ac9c816fb8ab6f408cf32dcdf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-62-desktop",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "73a8fdf89ed1a2d0af45142f4b4498545ce4182ca704ad2b292490263480b1fd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aio-510-22asr",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "47affcc25ded66333920985902473398438b49dac28be82542062ddabffec3c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aio-300-22isu",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "a6b6a2940a5f4c98e2f531624707fd8ab7dc61f4b3d3de0457fe00ba3cc5c135"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-c460-all-in-one",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "1235ca01cc48484db1157b312ec1632c45be511cfbff28d25404df0a3df47148"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-c365-all-in-one",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "7cf94927f6826886883baf229f3cc2f2545588a564ddb7583f2b52853aeb5b21"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-erazer-x700-desktop",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "8dbcebb69c00242f0a346c34776171061d606262f412e92f84be99301d413c21"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-h520e-desktop",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "0ee94a5c0d4b93a2a1618d144bb0a505865a5d308c484c80fcf26fe31f23617a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Multiple",
"vendor": "Supermicro",
"versions": [
{
"status": "affected",
"version": "https://www.supermicro.com/en/support/security_PKFAIL_Jul_2024"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Multiple",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "https://security.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-FJ-ISS-2024-072412-Security-Notice.pdf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Multiple",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "https://www.intel.com/content/www/us/en/security-center/announcement/intel-security-announcement-2024-07-25-001.html"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Binarly Research team"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-321: Use of Hard-coded Cryptographic Key",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-25T21:48:41.125Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "UEFI Forum Standards on SecureBoot and Driver Signing Advisory",
"tags": [
"product",
"technical-description"
],
"url": "https://uefi.org/specs/UEFI/2.9_A/32_Secure_Boot_and_Driver_Signing.html"
},
{
"name": "Binarly Finder\u0027s Advisory",
"tags": [
"technical-description"
],
"url": "https://www.binarly.io/advisories/brly-2024-005"
},
{
"name": "CERT/CC Advisory",
"tags": [
"third-party-advisory"
],
"url": "https://kb.cert.org/vuls/id/455367"
},
{
"name": "Binarly Technical Description",
"tags": [
"technical-description",
"signature"
],
"url": "https://github.com/binarly-io/Vulnerability-REsearch/blob/main/PKfail/BRLY-2024-005.md"
},
{
"name": "Supermicro Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.supermicro.com/en/support/security_PKFAIL_Jul_2024"
},
{
"name": "Intel Advisory cum End-ofLife anouncement",
"tags": [
"vendor-advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/announcement/intel-security-announcement-2024-07-25-001.html"
},
{
"name": "Fujitsu Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://security.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-FJ-ISS-2024-072412-Security-Notice.pdf"
},
{
"name": "Gigabyte Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.gigabyte.com/us/Support/Security/2205"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Insecure Platform Key (PK) used in UEFI system firmware signature",
"x_generator": {
"engine": "VINCE 3.0.6",
"env": "prod",
"origin": "https://cveawg.mitre.org/api/cve/CVE-2024-8105"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2024-8105",
"datePublished": "2024-08-26T19:15:11.237Z",
"dateReserved": "2024-08-22T19:50:07.296Z",
"dateUpdated": "2025-08-25T21:48:41.125Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-41912 (GCVE-0-2024-41912)
Vulnerability from cvelistv5 – Published: 2024-08-07 19:54 – Updated: 2025-03-13 20:26
VLAI?
Summary
A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware flaw does not properly implement access controls.
Severity ?
9.8 (Critical)
CWE
- CWE-284 - Improper Access Control
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-41912",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-03T14:36:16.370155Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T20:26:13.846Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware flaw does not properly implement access controls."
}
],
"providerMetadata": {
"dateUpdated": "2024-08-07T19:54:47.266Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_11006235-11006266-16/hpsbpy03958"
}
],
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2024-41912",
"datePublished": "2024-08-07T19:54:47.266Z",
"dateReserved": "2024-07-23T15:33:15.305Z",
"dateUpdated": "2025-03-13T20:26:13.846Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-42400 (GCVE-0-2024-42400)
Vulnerability from cvelistv5 – Published: 2024-08-06 19:51 – Updated: 2025-03-13 17:20
VLAI?
Title
Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the Soft AP Daemon Service Accessed by the PAPI Protocol
Summary
Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.
Severity ?
5.3 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise | HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10 |
Affected:
Version 8.12.0.0: 8.12.0.1 and below , ≤ <=8.12.0.1
(semver)
Affected: Version 8.10.0.0: 8.10.0.12 and below , ≤ <=8.10.0.12 (semver) Affected: Version 10.6.0.0: 10.6.0.0 and below , ≤ <=10.6.0.0 (semver) Affected: Version 10.4.0.0: 10.4.1.3 and below , ≤ <=10.4.1.3 (semver) |
Credits
zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.6.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.6.0.1",
"status": "affected",
"version": "10.6.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.4.1.2",
"status": "affected",
"version": "10.4.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.12.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.12.0.2",
"status": "affected",
"version": "8.12.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.10.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.10.0.13",
"status": "affected",
"version": "8.10.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.5.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.6.0.0",
"status": "affected",
"version": "10.5.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.3.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.4.0.0",
"status": "affected",
"version": "10.3.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.11.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.12.0.0",
"status": "affected",
"version": "8.11.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.7.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.10.0.0",
"status": "affected",
"version": "8.7.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.6.0.0",
"status": "affected",
"version": "8.4.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:6.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "6.6.0.0",
"status": "affected",
"version": "6.4.0.0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-42400",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-06T20:27:16.617985Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T17:20:31.058Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10",
"vendor": "Hewlett Packard Enterprise",
"versions": [
{
"lessThanOrEqual": "\u003c=8.12.0.1",
"status": "affected",
"version": "Version 8.12.0.0: 8.12.0.1 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=8.10.0.12",
"status": "affected",
"version": "Version 8.10.0.0: 8.10.0.12 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=10.6.0.0",
"status": "affected",
"version": "Version 10.6.0.0: 10.6.0.0 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=10.4.1.3",
"status": "affected",
"version": "Version 10.4.0.0: 10.4.1.3 and below",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)"
}
],
"datePublic": "2024-08-06T19:24:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point."
}
],
"value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-06T19:51:17.264Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us\u0026docLocale=en_US"
}
],
"source": {
"advisory": "HPESBNW04678",
"discovery": "EXTERNAL"
},
"title": "Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the Soft AP Daemon Service Accessed by the PAPI Protocol",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2024-42400",
"datePublished": "2024-08-06T19:51:17.264Z",
"dateReserved": "2024-07-31T20:37:28.338Z",
"dateUpdated": "2025-03-13T17:20:31.058Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-42399 (GCVE-0-2024-42399)
Vulnerability from cvelistv5 – Published: 2024-08-06 19:48 – Updated: 2025-03-13 13:37
VLAI?
Title
Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the Soft AP Daemon Service Accessed by the PAPI Protocol
Summary
Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.
Severity ?
5.3 (Medium)
CWE
- CWE-400 - Uncontrolled Resource Consumption
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise | HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10 |
Affected:
Version 8.12.0.0: 8.12.0.1 and below , ≤ <=8.12.0.1
(semver)
Affected: Version 8.10.0.0: 8.10.0.12 and below , ≤ <=8.10.0.12 (semver) Affected: Version 10.6.0.0: 10.6.0.0 and below , ≤ <=10.6.0.0 (semver) Affected: Version 10.4.0.0: 10.4.1.3 and below , ≤ <=10.4.1.3 (semver) |
Credits
zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.6.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.6.0.1",
"status": "affected",
"version": "10.6.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.4.1.2",
"status": "affected",
"version": "10.4.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.12.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.12.0.2",
"status": "affected",
"version": "8.12.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.10.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.10.0.13",
"status": "affected",
"version": "8.10.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.5.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.6.0.0",
"status": "affected",
"version": "10.5.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.3.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.4.0.0",
"status": "affected",
"version": "10.3.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.11.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.12.0.0",
"status": "affected",
"version": "8.11.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.7.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.10.0.0",
"status": "affected",
"version": "8.7.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.6.0.0",
"status": "affected",
"version": "8.4.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:6.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "6.6.0.0",
"status": "affected",
"version": "6.4.0.0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-42399",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-06T20:27:21.784664Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400 Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T13:37:13.997Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10",
"vendor": "Hewlett Packard Enterprise",
"versions": [
{
"lessThanOrEqual": "\u003c=8.12.0.1",
"status": "affected",
"version": "Version 8.12.0.0: 8.12.0.1 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=8.10.0.12",
"status": "affected",
"version": "Version 8.10.0.0: 8.10.0.12 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=10.6.0.0",
"status": "affected",
"version": "Version 10.6.0.0: 10.6.0.0 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=10.4.1.3",
"status": "affected",
"version": "Version 10.4.0.0: 10.4.1.3 and below",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)"
}
],
"datePublic": "2024-08-06T19:24:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point."
}
],
"value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-06T19:48:07.255Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us\u0026docLocale=en_US"
}
],
"source": {
"advisory": "HPESBNW04678",
"discovery": "EXTERNAL"
},
"title": "Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the Soft AP Daemon Service Accessed by the PAPI Protocol",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2024-42399",
"datePublished": "2024-08-06T19:48:07.255Z",
"dateReserved": "2024-07-31T20:37:28.338Z",
"dateUpdated": "2025-03-13T13:37:13.997Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-42398 (GCVE-0-2024-42398)
Vulnerability from cvelistv5 – Published: 2024-08-06 19:37 – Updated: 2025-03-24 21:04
VLAI?
Title
Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the Soft AP Daemon Service Accessed by the PAPI Protocol
Summary
Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.
Severity ?
5.3 (Medium)
CWE
- CWE-400 - Uncontrolled Resource Consumption
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise | HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10 |
Affected:
Version 8.12.0.0: 8.12.0.1 and below , ≤ <=8.12.0.1
(semver)
Affected: Version 8.10.0.0: 8.10.0.12 and below , ≤ <=8.10.0.12 (semver) Affected: Version 10.6.0.0: 10.6.0.0 and below , ≤ <=10.6.0.0 (semver) Affected: Version 10.4.0.0: 10.4.1.3 and below , ≤ <=10.4.1.3 (semver) |
Credits
zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.6.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.6.0.1",
"status": "affected",
"version": "10.6.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.4.1.2",
"status": "affected",
"version": "10.4.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.12.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.12.0.2",
"status": "affected",
"version": "8.12.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.10.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.10.0.13",
"status": "affected",
"version": "8.10.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.5.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.6.0.0",
"status": "affected",
"version": "10.5.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.3.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.4.0.0",
"status": "affected",
"version": "10.3.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.11.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.12.0.0",
"status": "affected",
"version": "8.11.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.7.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.10.0.0",
"status": "affected",
"version": "8.7.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.6.0.0",
"status": "affected",
"version": "8.4.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:6.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "6.6.0.0",
"status": "affected",
"version": "6.4.0.0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-42398",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-06T19:49:16.243921Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400 Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-24T21:04:59.030Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10",
"vendor": "Hewlett Packard Enterprise",
"versions": [
{
"lessThanOrEqual": "\u003c=8.12.0.1",
"status": "affected",
"version": "Version 8.12.0.0: 8.12.0.1 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=8.10.0.12",
"status": "affected",
"version": "Version 8.10.0.0: 8.10.0.12 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=10.6.0.0",
"status": "affected",
"version": "Version 10.6.0.0: 10.6.0.0 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=10.4.1.3",
"status": "affected",
"version": "Version 10.4.0.0: 10.4.1.3 and below",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)"
}
],
"datePublic": "2024-08-06T19:24:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point."
}
],
"value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-06T19:38:53.191Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us\u0026docLocale=en_US"
}
],
"source": {
"advisory": "HPESBNW04678",
"discovery": "EXTERNAL"
},
"title": "Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the Soft AP Daemon Service Accessed by the PAPI Protocol",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2024-42398",
"datePublished": "2024-08-06T19:37:12.816Z",
"dateReserved": "2024-07-31T20:37:28.338Z",
"dateUpdated": "2025-03-24T21:04:59.030Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}