Search criteria
2072 vulnerabilities by hp
CVE-2025-13492 (GCVE-0-2025-13492)
Vulnerability from cvelistv5 – Published: 2025-12-03 16:33 – Updated: 2025-12-04 04:55
VLAI?
Summary
A potential security vulnerability has been identified in HP Image Assistant for versions prior to 5.3.3. The vulnerability
could potentially allow a local attacker to escalate privileges via a race condition when installing packages.
Severity ?
CWE
- CWE-363 - Race Condition Enabling Link Following
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc | HP Image Assistant |
Affected:
0 , < 5.3.3
(custom)
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-13492",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-12-03T00:00:00+00:00",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-12-04T04:55:15.971Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "HP Image Assistant",
"vendor": "HP Inc",
"versions": [
{
"lessThan": "5.3.3",
"status": "affected",
"version": "0",
"versionType": "custom"
}
]
}
],
"cpeApplicability": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hp_inc:hp_image_assistant:*:*:*:*:*:*:*:*",
"versionEndExcluding": "5.3.3",
"versionStartIncluding": "0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "OR"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A potential security vulnerability has been identified in HP Image Assistant for versions prior to 5.3.3. The vulnerability\n could potentially allow a local attacker to escalate privileges via a race condition when installing packages."
}
],
"value": "A potential security vulnerability has been identified in HP Image Assistant for versions prior to 5.3.3. The vulnerability\n could potentially allow a local attacker to escalate privileges via a race condition when installing packages."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "LOCAL",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"exploitMaturity": "NOT_DEFINED",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "PASSIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-363",
"description": "CWE-363: Race Condition Enabling Link Following",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-12-03T16:33:39.056Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_13505078-13505143-16/hpsbgn04078"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "HP Image Assistant - Potential Escalation of Privilege",
"x_generator": {
"engine": "Vulnogram 0.5.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-13492",
"datePublished": "2025-12-03T16:33:39.056Z",
"dateReserved": "2025-11-20T21:13:55.431Z",
"dateUpdated": "2025-12-04T04:55:15.971Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
CVE-2025-43489 (GCVE-0-2025-43489)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:36 – Updated: 2025-07-23 15:14
VLAI?
Summary
A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.1. The vulnerability could deserialize untrusted data without validation. HP has addressed the issue in the latest software update.
Severity ?
CWE
- CWE-502 - Deserialization of Untrusted Data
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43489",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T14:53:26.779409Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T15:14:51.346Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.1. The vulnerability could deserialize untrusted data without validation. HP has addressed the issue in the latest software update.\u003cbr\u003e"
}
],
"value": "A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.1. The vulnerability could deserialize untrusted data without validation. HP has addressed the issue in the latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 2,
"baseSeverity": "LOW",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-502",
"description": "CWE-502 Deserialization of Untrusted Data",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:36:58.181Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43489",
"datePublished": "2025-07-22T23:36:58.181Z",
"dateReserved": "2025-04-16T15:25:24.712Z",
"dateUpdated": "2025-07-23T15:14:51.346Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43488 (GCVE-0-2025-43488)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:26 – Updated: 2025-07-23 15:14
VLAI?
Summary
A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.2. The vulnerability could allow a bypass of the application's XSS filter by submitting untrusted characters. HP has addressed the issue in the latest software update.
Severity ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43488",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T14:53:32.556379Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T15:14:56.207Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.2. The vulnerability could allow a bypass of the application\u0027s XSS filter by submitting untrusted characters. HP has addressed the issue in the latest software update.\u003cbr\u003e"
}
],
"value": "A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.2. The vulnerability could allow a bypass of the application\u0027s XSS filter by submitting untrusted characters. HP has addressed the issue in the latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 2,
"baseSeverity": "LOW",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:26:24.451Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43488",
"datePublished": "2025-07-22T23:26:24.451Z",
"dateReserved": "2025-04-16T15:25:24.712Z",
"dateUpdated": "2025-07-23T15:14:56.207Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43487 (GCVE-0-2025-43487)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:24 – Updated: 2025-07-23 13:18
VLAI?
Summary
A potential privilege escalation through Sudo vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.2. The firmware flaw does not properly implement access controls. HP has addressed the issue in the latest software update.
Severity ?
CWE
- CWE-250 - Execution with Unnecessary Privileges
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43487",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T13:17:37.578534Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T13:18:02.474Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A potential privilege escalation through Sudo vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.2. The firmware flaw does not properly implement access controls. HP has addressed the issue in the latest software update.\u003cbr\u003e"
}
],
"value": "A potential privilege escalation through Sudo vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.2. The firmware flaw does not properly implement access controls. HP has addressed the issue in the latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 6.9,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "HIGH",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:L/VA:N/SC:H/SI:L/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "LOW",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-250",
"description": "CWE-250: Execution with Unnecessary Privileges",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:24:44.253Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43487",
"datePublished": "2025-07-22T23:24:44.253Z",
"dateReserved": "2025-04-16T15:25:24.712Z",
"dateUpdated": "2025-07-23T13:18:02.474Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43486 (GCVE-0-2025-43486)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:21 – Updated: 2025-07-23 14:56
VLAI?
Summary
A potential stored cross-site scripting vulnerability has been
identified in the Poly Clariti Manager for versions prior to 10.12.1. The
website allows user input to be stored and rendered without proper
sanitization. HP has addressed the issue in the latest software update.
Severity ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43486",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T14:56:00.463994Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T14:56:14.596Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A potential stored cross-site scripting vulnerability has been\nidentified in the Poly Clariti Manager for versions prior to 10.12.1. The\nwebsite allows user input to be stored and rendered without proper\nsanitization. HP has addressed the issue in the latest software update."
}
],
"value": "A potential stored cross-site scripting vulnerability has been\nidentified in the Poly Clariti Manager for versions prior to 10.12.1. The\nwebsite allows user input to be stored and rendered without proper\nsanitization. HP has addressed the issue in the latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:21:42.248Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43486",
"datePublished": "2025-07-22T23:21:42.248Z",
"dateReserved": "2025-04-16T15:25:24.712Z",
"dateUpdated": "2025-07-23T14:56:14.596Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43485 (GCVE-0-2025-43485)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:18 – Updated: 2025-07-23 14:58
VLAI?
Summary
A potential security
vulnerability has been identified in the Poly Clariti Manager for versions
prior to 10.12.2. The vulnerability could potentially allow a privileged
user to retrieve credentials from the log files. HP has addressed the issue in
the latest software update.
Severity ?
CWE
- CWE-532 - Insertion of Sensitive Information into Log File
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43485",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T14:58:23.583510Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T14:58:30.540Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eA potential security\nvulnerability has been identified in the Poly Clariti Manager for versions\nprior to 10.12.2. The vulnerability could potentially allow a privileged\nuser to retrieve credentials from the log files. HP has addressed the issue in\nthe latest software update.\u003c/p\u003e"
}
],
"value": "A potential security\nvulnerability has been identified in the Poly Clariti Manager for versions\nprior to 10.12.2. The vulnerability could potentially allow a privileged\nuser to retrieve credentials from the log files. HP has addressed the issue in\nthe latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-532",
"description": "CWE-532 Insertion of Sensitive Information into Log File",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:18:37.858Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43485",
"datePublished": "2025-07-22T23:18:37.858Z",
"dateReserved": "2025-04-16T15:25:24.712Z",
"dateUpdated": "2025-07-23T14:58:30.540Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43484 (GCVE-0-2025-43484)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:16 – Updated: 2025-07-23 20:11
VLAI?
Summary
A potential reflected cross-site scripting vulnerability has been
identified in the Poly Clariti Manager for versions prior to 10.12.1. The
website does not validate or sanitize the user input before rendering it in the
response. HP has addressed the issue in the latest software update.
Severity ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43484",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T20:11:34.526319Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T20:11:43.688Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A potential reflected cross-site scripting vulnerability has been\nidentified in the Poly Clariti Manager for versions prior to 10.12.1. The\nwebsite does not validate or sanitize the user input before rendering it in the\nresponse. HP has addressed the issue in the latest software update."
}
],
"value": "A potential reflected cross-site scripting vulnerability has been\nidentified in the Poly Clariti Manager for versions prior to 10.12.1. The\nwebsite does not validate or sanitize the user input before rendering it in the\nresponse. HP has addressed the issue in the latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 6,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or \u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:16:02.138Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43484",
"datePublished": "2025-07-22T23:16:02.138Z",
"dateReserved": "2025-04-16T15:25:24.712Z",
"dateUpdated": "2025-07-23T20:11:43.688Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43483 (GCVE-0-2025-43483)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:14 – Updated: 2025-07-23 20:11
VLAI?
Summary
A potential security vulnerability has been
identified in the Poly Clariti Manager for versions prior to 10.12.1. The
vulnerability could allow the retrieval of hardcoded cryptographic keys. HP has
addressed the issue in the latest software update.
Severity ?
CWE
- CWE-321 - Use of Hard-coded Cryptographic Key
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43483",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T20:10:49.864916Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T20:11:12.870Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003e\u003cp\u003eA potential security vulnerability has been\nidentified in the Poly Clariti Manager for versions prior to 10.12.1. The\nvulnerability could allow the retrieval of hardcoded cryptographic keys. HP has\naddressed the issue in the latest software update.\u003c/p\u003e\u003c/span\u003e"
}
],
"value": "A potential security vulnerability has been\nidentified in the Poly Clariti Manager for versions prior to 10.12.1. The\nvulnerability could allow the retrieval of hardcoded cryptographic keys. HP has\naddressed the issue in the latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-321",
"description": "CWE-321: Use of Hard-coded Cryptographic Key",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:14:26.801Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43483",
"datePublished": "2025-07-22T23:14:26.801Z",
"dateReserved": "2025-04-16T15:25:24.712Z",
"dateUpdated": "2025-07-23T20:11:12.870Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43022 (GCVE-0-2025-43022)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:05 – Updated: 2025-07-23 20:10
VLAI?
Summary
A potential SQL injection vulnerability has been identified in the Poly
Clariti Manager for versions prior to 10.12.1. The vulnerability could allow
a privileged user to execute SQL commands. HP has addressed the issue in
the latest software update.
Severity ?
CWE
- CWE-89 - Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43022",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T20:10:21.143873Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T20:10:32.249Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "A potential SQL injection vulnerability has been identified in the Poly\nClariti Manager for versions prior to 10.12.1. The vulnerability could allow\na privileged user to execute SQL commands. HP has addressed the issue in\nthe latest software update.\n\n\n\n\u003cbr\u003e"
}
],
"value": "A potential SQL injection vulnerability has been identified in the Poly\nClariti Manager for versions prior to 10.12.1. The vulnerability could allow\na privileged user to execute SQL commands. HP has addressed the issue in\nthe latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "LOW",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "LOW",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L",
"version": "4.0",
"vulnAvailabilityImpact": "HIGH",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-89",
"description": "CWE-89 Improper Neutralization of Special Elements used in an SQL Command (\u0027SQL Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:05:24.070Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43022",
"datePublished": "2025-07-22T23:05:24.070Z",
"dateReserved": "2025-04-16T13:49:21.689Z",
"dateUpdated": "2025-07-23T20:10:32.249Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43021 (GCVE-0-2025-43021)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:03 – Updated: 2025-07-23 20:09
VLAI?
Summary
A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.1. The vulnerability could allow the use and retrieval of the default password. HP has addressed the issue in the latest software update.
Severity ?
CWE
- CWE-1393 - Use of Default Password
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43021",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T20:08:55.434389Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T20:09:03.981Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(252, 252, 252);\"\u003eA potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.1. The vulnerability could allow the use and retrieval of the default password. HP has addressed the issue in the latest software update.\u003c/span\u003e\n\n\n\n\n\n\u003cbr\u003e"
}
],
"value": "A potential security vulnerability has been identified in the Poly Clariti Manager for versions prior to 10.12.1. The vulnerability could allow the use and retrieval of the default password. HP has addressed the issue in the latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"privilegesRequired": "LOW",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:L/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-1393",
"description": "CWE-1393: Use of Default Password",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:11:58.549Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43021",
"datePublished": "2025-07-22T23:03:32.074Z",
"dateReserved": "2025-04-16T13:49:21.689Z",
"dateUpdated": "2025-07-23T20:09:03.981Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2025-43020 (GCVE-0-2025-43020)
Vulnerability from cvelistv5 – Published: 2025-07-22 23:01 – Updated: 2025-07-23 19:58
VLAI?
Summary
A potential command
injection vulnerability has been identified in the Poly Clariti Manager for
versions prior to 10.12.2. The vulnerability could allow a privileged user
to submit arbitrary input. HP has addressed the issue in the latest software update.
Severity ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-43020",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-07-23T19:58:33.347366Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-07-23T19:58:42.413Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eA potential command\ninjection vulnerability has been identified in the Poly Clariti Manager for\nversions prior to 10.12.2. The vulnerability could allow a privileged user\nto submit arbitrary input. HP has addressed the issue in the latest software update.\u003c/p\u003e\n\n\n\n\n\n\u003cbr\u003e"
}
],
"value": "A potential command\ninjection vulnerability has been identified in the Poly Clariti Manager for\nversions prior to 10.12.2. The vulnerability could allow a privileged user\nto submit arbitrary input. HP has addressed the issue in the latest software update."
}
],
"metrics": [
{
"cvssV4_0": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "PRESENT",
"attackVector": "ADJACENT",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"privilegesRequired": "HIGH",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "LOW",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:A/AC:L/AT:P/PR:H/UI:N/VC:H/VI:N/VA:N/SC:L/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-07-22T23:01:09.020Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_12781425-12781447-16/hbsbpy04037"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Poly Clariti Manager - Multiple Security Vulnerabilities",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2025-43020",
"datePublished": "2025-07-22T23:01:09.020Z",
"dateReserved": "2025-04-16T13:49:21.689Z",
"dateUpdated": "2025-07-23T19:58:42.413Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2020-6923 (GCVE-0-2020-6923)
Vulnerability from cvelistv5 – Published: 2024-12-19 18:16 – Updated: 2024-12-20 17:38
VLAI?
Summary
The HP Linux Imaging and Printing (HPLIP) software may potentially be affected by memory buffer overflow.
Severity ?
5.7 (Medium)
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP | HP Linux Imaging and Printing Software |
Unknown:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2020-6923",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-20T16:45:04.499370Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-20T17:38:57.940Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "HP Linux Imaging and Printing Software",
"vendor": "HP",
"versions": [
{
"status": "unknown",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThe HP Linux Imaging and Printing (HPLIP) software may potentially be affected by memory buffer overflow.\u003c/span\u003e"
}
],
"value": "The HP Linux Imaging and Printing (HPLIP) software may potentially be affected by memory buffer overflow."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-120",
"description": "CWE-120 Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-12-19T18:16:32.364Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/c06927115"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "HP Linux Imaging and Printing Software - Potential Memory Buffer Overflow",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2020-6923",
"datePublished": "2024-12-19T18:16:32.364Z",
"dateReserved": "2020-01-13T00:00:00.000Z",
"dateUpdated": "2024-12-20T17:38:57.940Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-42508 (GCVE-0-2024-42508)
Vulnerability from cvelistv5 – Published: 2024-10-18 15:10 – Updated: 2025-03-17 21:29
VLAI?
Summary
This vulnerability could be exploited, leading to unauthorized disclosure of information to authenticated users.
Severity ?
5.5 (Medium)
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | HPE OneView |
Affected:
< 9.20
|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-42508",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-18T16:24:05.740632Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-03-17T21:29:01.123Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "HPE OneView",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"status": "affected",
"version": "\u003c 9.20"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "This vulnerability could be exploited, leading to unauthorized disclosure of information to authenticated users."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-18T15:10:26.609Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04721en_us\u0026docLocale=en_US"
}
],
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2024-42508",
"datePublished": "2024-10-18T15:10:26.609Z",
"dateReserved": "2024-08-02T17:04:57.632Z",
"dateUpdated": "2025-03-17T21:29:01.123Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-7720 (GCVE-0-2024-7720)
Vulnerability from cvelistv5 – Published: 2024-08-27 17:28 – Updated: 2024-08-28 13:46
VLAI?
Summary
HP Security Manager is potentially vulnerable to Remote Code Execution as a result of code vulnerability within the product's solution open-source libraries.
Severity ?
9.8 (Critical)
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | HP Security Manager |
Affected:
See HP security bulletin reference for affected versions
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:hp:security_manager:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "security_manager",
"vendor": "hp",
"versions": [
{
"lessThan": "*",
"status": "unknown",
"version": "0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-7720",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-28T13:38:13.437654Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-28T13:46:40.617Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "HP Security Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP security bulletin reference for affected versions"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "HP Security Manager is potentially vulnerable to Remote Code Execution as a result of code vulnerability within the product\u0027s solution open-source libraries."
}
],
"providerMetadata": {
"dateUpdated": "2024-08-27T17:28:11.272Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_11074404-11074432-16/"
}
],
"title": "HP Security Manager - Potential Remote Code Execution",
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2024-7720",
"datePublished": "2024-08-27T17:28:11.272Z",
"dateReserved": "2024-08-12T20:39:19.511Z",
"dateUpdated": "2024-08-28T13:46:40.617Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-8105 (GCVE-0-2024-8105)
Vulnerability from cvelistv5 – Published: 2024-08-26 19:15 – Updated: 2025-08-25 21:48
VLAI?
Summary
A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised.
Severity ?
6.4 (Medium)
CWE
- CWE-321 - Use of Hard-coded Cryptographic Key
Assigner
References
| URL | Tags | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
Impacted products
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Acer | vz2694g |
Affected:
d61d0e09d008bfb29bc32532b1b94fcc4ee2af5e8372c6d38722a4e73ecc71d6 , < 0
(sha256sum)
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Credits
Binarly Research team
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-30T16:02:49.517Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://www.kb.cert.org/vuls/id/455367"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-8105",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-09T20:18:46.069299Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-09T20:21:06.044Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "vz2694g",
"vendor": "Acer",
"versions": [
{
"lessThan": "0",
"status": "affected",
"version": "d61d0e09d008bfb29bc32532b1b94fcc4ee2af5e8372c6d38722a4e73ecc71d6",
"versionType": "sha256sum"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aspire s 27",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "2bd2bfaf79a72eaca45e544e5c6a5bb842b292bdc229b8975b3101a4013e0d5f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aspire s32-1856",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "29837e239487cc83818a7f40f9280d9692a50376487899edd603494b0f30e4c5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aspire xc-1710",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "cdaa406bda1a58fbe9933622dec218a26f79871d42f0d3576fbf878e51a16201"
}
]
},
{
"defaultStatus": "unaffected",
"product": "c24-1655",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "399f68dc94a6c42030efcd57fd034ff721f860b7b5d447779e7a6a6c99aba34f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aspire c22-1600",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "d938d08543d35d4249a51057c1d9c62bb1f6440af19913c5feffcea47dd3de95"
}
]
},
{
"defaultStatus": "unaffected",
"product": "c24-962",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "3d525f96f63995c51ab1bcd2c50ebb71661ffeca9f78f97cc97e851d0e2bbbdd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "altos r680 f4",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "a2679a9595a104d70bddc024dbc4f65f0dc9d906f30a0d1ae6b996b14246a6c2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "altos r680s f4",
"vendor": "Acer",
"versions": [
{
"status": "affected",
"version": "e5fdaabf11b236c5c7b040d674936e84db746a180ab9999317e16dcb77aeeba4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "iAPLx-DE(TAA30 TEST)",
"vendor": "Aopen",
"versions": [
{
"status": "affected",
"version": "94c6f84946db100b505af8a308f69ef6cddc2e310b50641a6e2e63bc9aed54e0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "iKBLMUx-DER(Volta Charging)",
"vendor": "Aopen",
"versions": [
{
"status": "affected",
"version": "fcd339e12730f057e41ad41228f9612d4954f2d0dbcfeef37e14dcdaf2866e05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-15-3510-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "7fbfd8b03d178e074572dff764f28af98c87c7556ce3837ccb8dfe993efa1940"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-x17-r2-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "65f5939878deede2e1b24a6412ba025b78f45b1562e9d365d97e1c76a32a1832"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-m17-r4-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "f75b595b9ce5e1e25a5d64e54edffdf696251b4f4e860c0d3a03a183631f090e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-x14-r1-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "620848eeadb74a572d6400672aecca35f46dfdc7b5152bb028fbcbf74ea7bccd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r15-amd-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "6348442334e85e8374884ea848685771053a7cf274ccb77559c710b5a00f61e9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-m17-r3-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "413a04c12bde19f1f97d9d334ed57197f0405f9f10ab7154d2b71e5471577c97"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-area51m-r2-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "253743e7a39d0b709122c5329799f4c4608536eeb632218e7f0cbe1f6e8b5db8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-x15-r1-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "4fc54067f263791aed2fa4b57b226ea15c4eb0f55b3797e002bb62aa936bdd8c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-15-3521-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "e2242e4aa3a284fcbbcf2f38a10bec24408f1eff74bb307e699ea46f483359f2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r11-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "8f79d9de33f5f131226a78ccb10bb16218a5be51b2105cc32e38ceb0c8c30e9a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-15-3502-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "62c02a9b5a4d4328ac41c3e3aa7757e64e6c5cd52b9e047333ad18e60d17fcb6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r13-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "dc5912033c5ca14475f2d59ca47f25c8840f362f0c8553d13bb06a8e47c42abf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "xps-8950-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "6982be0bd8e1aed1251fe5300eec2b515b7cab70e761cfb72074f5d658d092d9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r15-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "7e310dca802db0f7a22d39bb2d7d5b79c7e9df8e5698f0e691942ec334ce5794"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r14-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "26a447a94e96fa8d9c590888cae490750c32d5af95faece3595f21efc41c1f2c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-aurora-r16-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "06a9dffc8fb3edafd1b6377cf38879860a0ae3c87f97258e09d189d291f64ead"
}
]
},
{
"defaultStatus": "unaffected",
"product": "xps-8960-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "0dcd7494f4926fb04b56e9713f0b62eff3a345b626fa2adaf47636bf0bb4c3eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-m15-r2-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "69da86e9cf24c49496529f3041604a6bb1c0c0ab86c192239d31d3a9b92467cd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-17-3782-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "602a23f43b11817ad5439579969753866a54b836f34dfe19342e5188cf088d85"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-15-r4",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "608e410d1c0475dac58b1e8f36b477aa8d9e9f28d30ec89d44b550e36bbbaf47"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-5680-gaming-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "f1075841f54237735c1135ebf92baeab9c0c3f8b051229f898520f5b0f265353"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-17-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "d4ed519bd5e5ba2f027d00635494d485f19f3080d8baf6d711b190323294e216"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-13-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "cb25317443d65ba126174c8b7547c7d2f6c0288f859e2063436eb7b350d9bf62"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3472-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "02877ae1ee43c787fa980d6e897e14546ac193100395bbcc6bc26fdf3077e860"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-17-r3",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "003130dabf11c8b5df286d9584b3174faa9529cd6149513d13c7ce85d63d97b0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-13-r2",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "e6819bd24e063807336994f36e1b7cafbbec46c2679a365dde1b54b720a049e4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "vostro-24-5460-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "d54e560849c716d0ded4b25d9aacc746f77174cc6d3eeb3a50424eaf337c92aa"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-20-3059-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "4b4fd4cc68e48cfbacaf1279ff42ce6e9d37aa7706efffb2a0bb84fbda2aabd2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-24-5459-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "2c6a0bd7b3a91b9e1b309bde7d405812a42abe40001ce661252d81e7cd009650"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-22-3263-desktop-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "13deddbbdccb6e5411317e96bdb045e28c0dcbb7e86ed5f32e5d24b4b54a5657"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3250-small-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "95446bcddec63d36a9f5554815892c104febb73c676a075d789e4b7c69979fa6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-24-3464-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "3ffd081959db4684563f0044cca9ac16d5467a42d40913f503bad8d171bf1c99"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3662-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "5a02b9214bb7ca03030323835a85efd84d369ff02a6baf9193083e2b22e8d0c3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-13",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "fe9e2b75babda09ba22a3e99494198e125188d9345bda2b961f10e98e6c2b784"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-one-23-2330-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "374f19a62abe5b7c195038ebc945528046478ba7fac2b7b429edfaa47122e6e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-17-r2",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "e94ccb36573d53127cfdf1f6d617c31ba8562fbdd4b43e48fe1fd52325315756"
}
]
},
{
"defaultStatus": "unaffected",
"product": "poweredge-c5230",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "52dbddaf0c9803e7f9dd389519b829515abe97dc0fbd9b979230de28880f595d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "alienware-alpha",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "f1d2c02737ba96e93892f38c161b3f35fbca79a4302e439e8405d3434ed88fdb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-15-5552-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "73e72a45f92daa7ef76dcf82e6d13113cd9acbd2250d78d2e02232535f83fbc5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3646-small-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "081c82a0748297ca5841b1772330fb6e776c678d425789a66e3072fb73d072d7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-24-3455-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "2fd0f72190810fa5c4a2a3f57a7bce51dd0baa47584b59b7cba4752a92c66ee5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "vostro-20-3052-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "c4574a6a5e1e6b4f3b4a3317b51d75c3764395775f900b9ede99dca5e76849f2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "vostro-3252-small-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "9cc04e65928cf4852d0ae16d55808b42542387ae389ebbd3e42f888638909932"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3655-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "31a7af2885146a94a82ce214a26e4dcdcfa36969aa47a7a1eaf3725fa6a2198d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-22-3265-desktop-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "7c0c8fab8b15d6de59936a3921f85d9e79f710c6c6db6459804b679d82760e26"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-17-5755-laptop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "19967c4eebd851b31936c8cab20f86008c7f065cf93217f6cc82350521cc640f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "inspiron-3656-desktop",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "a0e12007dd08b6d9a22fcc6548d0562ea3a966b2030ea9d00c739971e02b6c9a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "vostro-20-3015-aio",
"vendor": "Dell",
"versions": [
{
"status": "affected",
"version": "05b03dab647098c957cadd2a66ebb1401dc5dae51f267351c0d076c239d5856b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Studio Sys UPD",
"vendor": "Formelife",
"versions": [
{
"status": "affected",
"version": "a451ed9d6359fd109f495c75bab2678285265a72be64b3e5d0d5447a0e167cd5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E152-ZE1 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a9638651a2475403924f124552dc199689a45d2e2e59e3dea2b223667dfb63de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "AU47 M1",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "d3715136d50fc486ef59fb4aee1d7f06552fdf98423809939538fe905a1aa0b3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY TX100 S3p",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "bfadb1d20541d4c39857e7b295b7ad20ce81d393f014eae27565bc173c1880c0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY CX270 S2",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "e44c2088ee54191192cc690787d74d8ddbfe3fc97c58fb2c42cf8a952784c94f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY CX420 S1 Chassis",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "c27a0e267f18a89c8ba8aadd37786ef8fe18162b60b45fc209bf992b570837af"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY RX100 S7p",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "e71744d4e18cbee18a1fe381a8a83350487baa6cfbf3729d999f85d7b650610a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "PRIMERGY TX120 S3p",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "51a9197d05b1aad84546d9469b2c400bd7536eea62b2760a308e5bf84e71d74b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G152-Z12",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ad457250d51a0638880d9cf1df9dd029ab34b36265eda73c5459d8d0460ba3de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G242-Z11",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2ab6af312a78886a13144814ce766a771604755f8dd303381658026304415280"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G242-Z12",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eef3fd99672410b85e6342c5757723d0d3ccecef9805237955baa20780de8b4f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G262-ZR0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f21b8f836105cdb4051d8bb29302dcf86836b640bf048b24f3c76e930b513b32"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z20 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "62bb737d55f4caa082b7ea2aa6f8a59c8efdaf9d5ac5b158cbfb32a6cead8164"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z43",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1b6ff7d60400c7c21a5b28f947475e61abee187627c1ff12cddb25b1ce59ecb3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z45",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "18def9ce5aa6551c1d7e77e9f53e34701f77b89d6b32d41ea050cc94d52941e1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z50",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b14d2e3fadc16c97684a4ae947798bb3a67372441dd7252568f71fc86e98ae9f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-Z52",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "062e3100bfbe635c66feed863141f7a6f2bfcf0b887a5b3d7ae31fb610d17cac"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H252-Z12 (rev. A02)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ac416150a9752dc20107bef240e73c6054af4992348003429bfd97a7373f4f27"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-Z61",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "340cc5c8f4468eb2d36b684dffbf139b4ac4504b5db3993c3c1b5145858c5131"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-Z6B",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0e761b6f3c7d3a1407addf499ff848c493a9d0b0197368cbe858bbc4fa5a4702"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H282-ZC0 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0b739af751913ea6ff42999069963dcf6a1bdd58a3de800ab721d9bdbd59bf0d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ32-AR0 (rev. 3.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a4102b19258804214beb838f61699a7623cc654341e6f60ad986dae805935c14"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB0 (rev. 3.x/4.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e0a3837abd91821c4ad98687d2dc6456b7fcb05c8b672c48f242ffeabfa3e9b4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB2 (rev. 3.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7678e64f7728c059b228ddec74f0918f0544d5193f7b8efe0bf03e8f36c2f5c5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-Z10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "122baff0bf1243b945a7eaa9ca55303469d624d6150d4da136d697878177f1a8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-ZA2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9d318d27111a3c5a2e3a6451103750d70dec9d6e9d048f7e98fcd60066b98aee"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-Z90 (rev. A00/B00/AT0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dbd77ee47e4bccbb2b8af2883765641e9d7c404937da2942637fa1b4b6d4d635"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R262-ZA2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c7f73261e85bdc43932e49254cb8654ed2ce0945379592cecb081d51e5834289"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-Z97 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "076310804e591d1c2d4ab1d53cff0866c04a4189e03e6964b528b8a94faa7991"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S252-ZC0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8927ee41096d71b75bbef2672e22f640a22ae3588f4f44786fff92c70b861885"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ME03-CE0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "79700c28616b906f5534cf45d4582878a73f96eff24f1f894bd04b24c00eade8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ME03-PE0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ac5ec67cafd72fd7f497c3759b0dcf359de8b7db6941120c0c69d5f3eea4bcbc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ME33-AR0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8bdf9b526d2e9e65f23ded60745006c65678d184a258761666d3864432cc0cac"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R143-EG0-AAC1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "630321979d80b22e20ca5fc713b2e3e1a8d9ec9ecaa6e2f814193ab8471636aa"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R243-E30-AAC1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ae9c0a6e84b0c2912eda99c2de4e95d45c0c8feb2a097e02832ae03c74796f50"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G191-H44",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "28068e88e5041161f4485f958f49060d6a865e4beb0b53bafc8f3c5e5e3923b9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G241-G40 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "912834981a1de06dcdd4f8cfd11e7db46ac691e5ef20616d76d859e889c303be"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G291-2G0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0dbbb711ff0879479dc30b9a7116fb94f093e0225b74916f6b79edae90d8fb2a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G591-HS0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bce2bb4589e9ba8bc8029514a887f3f3bb4ded3556bb5d77dc1a38bad564b435"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H231-G20 (rev. 100/A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "819cf98fc21e036b3ae7e6390ae09edcf6fc6c260b22bf6ede0852029ef2495b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-H61 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "190d03dff0cfed20b38ae3270c8bb197b024765963dff6b7730d96bfebcbb24c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-NO0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7eab23785afd939c2abdf53e001e896c67216a6cc75b646d990fdf92ae226748"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H281-PE0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9f715f7b4128701de97332885c28547fe89ca4214de5af85623ab90670fdbbff"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD61-SC2 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "98c90d7d56e82fcf28b362fbf659c3dfd3f987de96d997defe2ef2e78f33cecf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD71-HB0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "82bbbdeed52e95c3f19ad09cc8fff5ea17f9f5341fbef5f88fba478c24e9fd66"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD71-HB1 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c6957244c7417f2ea28889e02d23b63091b6049b82263872ec3a952765becf9c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU71-SU0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "67c4f4ad83e151ebe6e61092bec3153ec269e7be1945dbba0c61091a345a885e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R161-340 (rev. 100/200)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1bea20b7f9327d743487da2db53e5fb89ace6d22f56600b58918737418e716ee"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R281-3C1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "aef16fc11c0f6ddca64581dc5b42b9d6e4ab66807ae7c5a30ccfd8f6774a2b18"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R281-3C2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5077c5d90bce52e6e22371dd64910f30aad69c42aaf9a144165682fffe23c3e0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "T181-G20 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c2b46f65550950fb75d45f5bff54bbed8d4877d803a9688739abd47909fc5f6e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MC13-LE0 (rev. 1.x/3.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a1f593c61f035734a87dddbe547a18a52d641785c40cfd320b0a0802be57a1e5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R123-C00",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ddce5a86b35fcf3fe494169bd1834b1f40f24b1a4938e5239bba011dfb981949"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R133-C10 (rev. AAG1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a09c15eaf24a7804b16fa6fc8e4d16c8ebbc850d070439b2c1ead835f4626dc0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-Z23",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "36b879d3be098143f10fd76db48424f3c3470ffffbe2f828ec7462bd8ec73dcf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-Z42 (rev. IAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b98e94dc0b78131fe59ca6a9c0a142037d412e2ce5fcdb9d0d6d10f102b1d5fe"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G363-ZR0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b2bdfb3a454065b92210cf8a11ef836b45b1db8679d31b45e65a71d1f5efdee8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G493-ZB4 (rev. AAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "930761233953091f36c6f92e069229f7dd6c86555c03315e1cf51f9fd349ac79"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G593-ZD1 (rev. AAX1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c564d83ca92af69a296c473cf748d2a6062883164794856c8be429a652e421fe"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G593-ZD2 (rev. AAX1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "74e19d515a7d2d4644f026bd8ea3ee5035b1d325189d9ff2184892a62a7cddc2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G593-ZX1 (rev. AAX1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "637be0a8baa2b2a07788add89178c5ff71b837b0d7313d31252293e87a8c3734"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H223-Z10 (rev. AAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3d2868fe9d5c6ff7e0397d929f170cc6ff006c5d1b5f7bd99d937de8f93dbcd5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H233-Z80",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5bcc229773a51f96a3904ab181bc621231f881b88a9f59b9427555d9bc868045"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H253-Z10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4978fa8b487795206594ef340a6c846814e02e248aaf6d6d22e21e58c194fc00"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H273-Z80",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7d216a628dc15d65ad64ee6535a8c190260c9616945108237dab43b3fb1ed549"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ33-AR0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2c185f2a4900213d87796a8f1b7ba719d3506961c3587cc6b6c39ebae2067e93"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ33-CP0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "13b00bbbbe69eb17f726a086841770b17b9b5b02c903d165e5dcbc371b87e4d6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ73-LM0 (rev. 2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "140cae90bff7b80c41f0fc69c6439ec9ef3e7b54e408a29dcb9b41bcdf07bb3d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ73-LM1 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "36d2df2564747908c8f8b28df00ea5504783b9308fc76899d0a5ac1b57f43361"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-Z35 (rev. AAC1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6e276e4fdfd0ddecdf0c1df49718595d0c4bcb28850897215b88fa01c239b62d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R183-Z90 (rev. LAD1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9bb0e8c4030538d2b820b333ffa1b211a7930953f30bc9ba206eb26adfa45741"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R183-Z93 (rev. AAV1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "44c75c03ddbd8689b7a5df96689d730f002367d428da0982bf089c8f6909a75e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z35 (rev. AAF1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4f59fb01703b0e6cd5140683e9eb6d98c452b3acb64ab642004276daf49e1ace"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-Z93",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "59c838f97265422664d3508ad13e370351e9f482983d942dd7fbf33bbbf00587"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-Z97",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "42329f479e5572eadd01b94fa8f3f3ae16b7fb4452ac2111f886855e4f52597b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-ZF0 (rev. IAL1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3b999a0a4b3a7336597e7373e3317dd29b91f5510fdfcc8323988d1edab6c23a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO25-Z12 (rev. AA01)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "920c4d1c705e8b80e94b19f2c690d1fa4f25f0f6954db6209ed5118d7927fc32"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H223-V10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c9387dfa08afff4cd1f875331c6eb24ac6758d608976603c7398c039dde35890"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H263-V60",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "76f7ae620a91ff5e8590a2f22f59018e613aeb12b626b886d6ce2f5e4276fce9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H263-V11",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "57be6485a091b1f60afa9a2af34cff051e293d03696c04ba578f97ac38a34d4f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H263-V60 (rev. AAW1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2221d582286ebe04101fc5bd7e353e3f8826c86f948defeb8ac265b8c7ceb8d9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E162-220",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0c8eb9d218ca1706bd15989efc2915e792918b52cdcac38a4845913631f6cccd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G262-IR0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ebf41cbd3da1701755a788922944f1ec7e13aa8396a03611cef2e3940da4cc20"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-280",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5caad5c1ff5d9518017d64a2dc8cb2a83e294520ba6460c0a1b14212688f39a4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-ID0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c2902ae30064150ea9236e92b819a2cf96c47ad73f0439233471b89bb04cc13a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H252-3C0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "436d56f15a1373c341638cc0edd950866bd519e0cb1e0de07ab7df2c59fba5d1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-PC0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "83eeeab2bc322fa12b1ab2be69ba64ade98d999f8e1118ba1d6957c45b52a6c7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-PC1 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "083289beeb6b2d85285084059994d0ae833833cc7284428b6eea303099d99090"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-PC2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "db38dafec56ac3bb8948390f699fddf5a3f3f2b33d0a696d41c803c059a5b940"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB0 (rev. 1.x/2.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eff883c442f1805faa24a44e645413d9c9d3d95e6e0bb5c227124f7eac8187b6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB1 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "43eacbb8f8ffe499f4d0715cf6f798cd81351474abce0e410ecfeed7071740e3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB2 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ede862fa7c647cdd18ab5b2cc90aeec53c35e7f2a9e8d3cc9bd4f1f4e7837b30"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB3 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5ffc9128e64f5a30a78f594923301a6110a8a97c236665f4d4ca7ea28d8a8d21"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU72-SU0 (rev. 1.x/2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "776719490d81637a1604081fa3e9ea7fc975020cbb45103bbe4efc70ed69c6e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU92-TU0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6c0481e584911e1758040140b89593d1839956ef379a6d45d5ac37d0666b866"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU92-TU1 (rev. 1.x/2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "80073632c479a5522a64e14cd9bdb4cb12c3b86eb8eee5c36f63c40c96865334"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-34A",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "da898f000b47ebe799f88868276a9f9a0744ae283480c70b4506f17218696a52"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-NA0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0b851b25b7dfd2d50e710016c21c06a5aab78fcd64597ca631669b7e6344db6d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-NC0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "75adec4e87cb200578f3899c3bd7435bbdadcc4941e5edcb5a3fe3055a8ad190"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-G30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ee788077e078691ba0f587f2f9f044667b3463f794d8f38fa0c96e8b68550703"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G493-ZB1 (rev. AAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "64c336027bad7ec398c64d31ec444c47ec0d0b60eaf89202547967cc1b21fed3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ33-AR0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4270e08e2fca65beb36f8adaf338c4b94d248a98eb3d205d0fcf6a1cd2d6ca6e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ73-LM0 (rev. 2.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "29ed1fb8fd445c86fb30ef02e78db0b5be5213ece5edebf5f9702daaa94f5ed2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ73-LM1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5be6bd89d0e644714c6c98502efcb6e5b90fbdf3101f82cd821d04d2fb11e60f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z34 (rev. AAH1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "00089e4dbac3fcc36ba347ac7d7f9067722601a9a55c2360bf9cae439a52c010"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z35 (rev. AAL1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ea3e4c728b066bf6827adb0497ec6e32ab66c546c4ca89fca8f3113c3d74e950"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2 (rev. 1.0/1.1/1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5e55411efbcff6e593a2de57f46b6040324f35c1ed14f902333a71b6cea38930"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E251-U70 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6c404dfcb9550bf9080bb679ccfba607c96b149772c345ddeab0f881fdd16f8b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-Z40",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "84c011953dcd5981156d4d5488c82f53ee73cc839d3359004d491b0f1fbf2808"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G493-ZB0 (rev. AAP1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c4dca3104af399295b160bd3ad7d01d38f9dc86e7143dceae68403480d7c19cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-Z94",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "47da1b96a4296aa07edf9e4f54df7dc663e8c8134477ee8718319667073a5d7f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-ZF0 (rev. AAL1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0f77013fe1a7795b311828614ab371df89c88dd7ddd165d17130422289838731"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX34-BS0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c5b7f646ddc82ab730c91e13b52d86d9fa3c28d0b0cd1569fcf0a9b77509d7c4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R123-X00 (rev. AA01)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "876f82d1e8632fff9b24a04be60fb1486a1e4eefb8b20183580874680fc06150"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-ZA1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8567d8f2fd8a32c33c81aae33ef21e34f818159199f0beed6c10dd6e2283351f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G242-Z10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c7e9eff716b9e7000c89692637c58014ee0be37d7ddd39a0c2ae4ecba82e38fe"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MC12-LE0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8e37407821e4af774debc51d6dd492c11fe6652ebfd25febae7a603a7ef69822"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW34-SP0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "add3e41160a5effcd5a6dbfcda45072059e02f5a6fa39042fdbf36ae8193067f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E133-C10",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d5900b5a13292df17073793a00393ea8e60a645104ebf8d95c5407674421c76"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E163-Z30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1ecbdd2c9fdb6e9bc4f2e48b5b3e1651977a39eddc6480cc4888462636648f38"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MC62-G41 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dc4153ee0a3333ab789383cef8b0d9760b9f416138a093cd3357370261babf4e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX33-BS0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a0e138096681313a3923eefa3bd3480e6416c73d627d3888b36ce7bb6b2b989f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MC13-LE0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b9f880e1df8c0a237dd9cf607e19287817eb75f59057e8df89ade763ca7b6812"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z33 (rev. AAL1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d18f17a61f21b0b96542a3efd2a543cf87b434d86055e48aaac951f09c53e0e3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R133-X13 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3e3fbdde80c01e9755408922f67ad04834a61cb5e519ab010b151b68772a9784"
}
]
},
{
"defaultStatus": "unaffected",
"product": "B760M D2HX LITE SI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "641b9c056a8fecdc3a572db60e00f0b0fed7722fe9cf377bc4b6ee9208423107"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER7-7840",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f63845840d8dabf49f4a1137c4b1558257748fc26812bd693de92ed0257362ec"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-Z32 (rev. AAG1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7fd571d3ff56fa697a130f06d98ae3d2568e4e3d5848cc0966f4e00617801cf2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD72-HB2 (rev. 1.x/2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e01af875c3100fa3d72d014aaf93417317a1a4a4e69c4a28c216c73dfa5e041f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H310MSTX-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "094ba53bd3f96434153ed4c426a2c9f8b62ccab2b7ff60932061f9fa84a9309e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H310TN-CM",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9f5d955a2b3e33b9ba93e98d56a3ce4c997c4234161a4637aa88eda81cfc743a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H310TN-R2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5ad827acb383f51e80cfd4605f8b02186b680f61ba0129e6c054af896dbe6d48"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H310N",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "de983965452c5d6bdbf7e4137ef30782337efded699beb2db1cb1cfab2a9cdb9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R143-E30 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a0ed7595a6c1b6e26d1e930ca3a8c1c0dd619db049ef112fa653b8bf9b026bda"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO25-Z11",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c70331be155ee7c048b0296e15de195158c1215b1ddb31fb842018467c5857d1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-S46 (rev. AAM1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4151a030854ddba555d497a9d2626723d662a9c81e86b39e4e2c02c209ebabbc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-S35 (rev. AAH1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f8c33896586db20586273c8378d4fd18e49a4db7b6ac15333eb67536536c40da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-S94",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "70ed5ca85b768ef6f9bb36baa9596d07fb259c775b457464c138a7494f7340a2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO25-S11 (rev. AA01)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9ad9beef2a8253dc72e6bdd37d76bd54fcae482fbd3308904d87dfaa4df281e2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z54",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f446b6d7d932602558e4abdbea9a9b826a12d27c535ca6c2d0bafa5e34ec3864"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R183-S90 (rev. LAD1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9cee49e6b444421c55798f7ce7bf7a1eebc6d6f75319c2bcb39bd11b4075c71a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX34-BS0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5380cc7bc3d652f0d0316dd3225fb45f1bb054e9c568b9c8e8bf9591306cdbaf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-S45",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "77b27203150cbb0b885df35e361b1a193163316e3f315be4e7967312b097aedd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-S30 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e0c5fec105a86f8b7ffa77bd983d3ed0b54cbc65542e0ffdb9aae29cfc2ddd8e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R133-X11 (rev. AAG1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e8f28f55ed2fb648c7237e216e5c377da45e9f6d6a746605515002aaf502ae4c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E283-Z91 (rev. AAV1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1fee6620306388e1d23dba7889b858bd56a091cf04ee68db32639e14d9b87a14"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R143-EG0 (rev. AAC1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "672102a1648ac9839230ff8c818edc737b01fbe92250ae0db8ae2441b257f5d7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BEi3-1220 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "39ea2372c5af03dacf3a4112895e5bb59489497c23828e38acd4b4fec35df970"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BEi5-1240 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d34f17d147062c8aa223fd2e528b8c10c0879e8ee2d6064607f45e93908a935"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BEi7-1260 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dc45a2e1fd0112f5deac4678b7b093d4e233256af8e492104658c38a5ad426da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E283-S90 (rev. AAD1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "059d906408ac5c7daa81504d9e9057023d7686c9383faa48ef6f195d4b32d997"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G493-SB0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "394bf746dc6183441ea4d034769683c92eb999195fe6ab6e1fbf10c4cd1aed32"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H263-S62",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d733c74eeca529ae54b842ea757213532781db14b38c9222f4eb34be5ac7e1b8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-SG0 (rev. AAC1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "35ec23b26774c9030a1deca1b66837805aa7bedd6518d5be506681f2296b5e17"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S453-S70",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9fb2a464f53ad26c1bab90ee2437c0c265ef6d0faf419af58baca323c6156b7a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E163-S30 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a7ac0837b77d7a91edb4e5fbfde127eafe1601e858a6312af9e555646de46480"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G293-Z20",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "abe7715141d75d5817b2456105d037d116c441796c7a373dbf3307412e111bf5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO15-Z40",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b0766c740aceae7f71543bfb22d3c757640e714e52f32a17a3d42f9d16d39383"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E133-C10 (rev. AAA1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2af044c4474abc534ec6da84e1e6415386421dbc897ed2946efe131840de8161"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R271-Z00 (rev. B00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dcff49fc24b1b8cf02fce97a15b0bc8bb19c6979df21136007c677ac3b9023c7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "ME03-PE0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2bf55cd3046c8fb548063466ea9eb0802c4401f3c04a13f9ef693fe7c23570ef"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2 (rev. 1.3)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8448a4dad1df740fb0882eb8533c40a2227e385f9f2f07a546c1d2e6020b7cbf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0dc9159572d38d754e168d1290219dc558cc72e67e8fa72727ddd43a5ad187e7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E152-ZE0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "83d24271a7b1b9bba7070c128edcc8b4d6a5e7c96caa920baf5c014efbf6775d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-Z93 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "255ffd2b1161bb8a53626ad3920c40eb5f0f63cb1d5710969abf31797f8771de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-ZA0 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "85f9cdc44ed670c411f0892b769e91567f9a81bcdeb92861fcf6e2ffc7773f9c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S453-Z30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "92c197c09f8aaa2e20427f649cacd1484ef7a345040f54eeb3135745b6f671dd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G262-ZO0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "efc056c3caa782e178b7ade2333316ef39a0a6e17157c68a61927b3a045061e9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-Z6A",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2ac696517ae7da9f3efe81af66b89b5f7b24beb6e09aca06e61e454915070a3b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB0 (rev. 3.0/4.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2ad038a3b127e95df1fc8fa61bafb96a113fe0093d9ecee66db9ece973c5a257"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB2 (rev. 3.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "225cea866d8c5843d32d6edc97764b69b05707e47c9537e6e6e7f4ac06775816"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G152-Z12 (rev. 200)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e7969888310f2eceb73544fd8108eda95c1a3ea62ff57da93c643bc55b898f50"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z40",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d31512a9a475071b6e14a03aed7c5286aa0c622925d7a840bdee7158a7d9583c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H242-Z10 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1096dfa8e4e5f5d2410eacac73c51bd1b946bc4d2f110a44e8c33f53d0182eb5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R152-Z30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5297e4a26fd8ed927abcb2438a5ac2a4e35e770d06d272ed77b3d847bebb11fb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi3-6100 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e81cd2760e4d5090b1d0da86309ba993256d88a4abb8065ce83266bcf4f0ca34"
}
]
},
{
"defaultStatus": "unaffected",
"product": "E283-Z90",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "40d4956a427564b83b0c1a86f1c32510feeeb5282eccfb211bd29f0a0a7767c4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R163-Z30 (rev. AAB1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "58a47d7e153b03ce005686aac24bfe31f405a7cc4670b826ccc775a839de7ee1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G262-IR0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "43dd7e97fc6fd1fc0ac1ef601c00eed9ec9b5d5325243fb8c6f0ae3517fce89b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-280 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5b7eee5f852ce1424dfd476d8713650e528fa359f19e551b7adb9b6a12ad467e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-H80",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e79fefca976e762f76a8ce36494928dc2ba039de02b69659a87b5245cb27ac2f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-NO0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d04141fdfff53843c10ef247e885ad9fb62ffc58c89580718ecd2b102a590f30"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H262-NO1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ca65772cdd5fef0d287957d5a6e308fa1126b9b40a2cd701e1190e852ce0bfd2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R182-340 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ade7666d9e200c0929260025880128674b63349911f1d03857a42cf753f10b80"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G291-280",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6917b15d532856e0c0f7cbfc3501f4d5c273616046d94695e01ce07303f6011f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G481-H80 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "53a8edb12be4b79c231d3f950e20343f20f3727a6544504259639fa6506f2457"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H231-H60 (rev. 100/A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "56289ef76755acc7f4e843b3ee0f29ec8f063f113f640b157d095d18a866d874"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R181-2A0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "01c95a23c9bfeff78ab2b6d77ca33e6a967cf624d1afb5fad393776c79a25920"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S251-3O0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "303797b38020f7b91381f887954f819112509c4b855ebd75c7a31dd227acf1cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S451-3R0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c9a2e7d55dcf6e3f7537515d2c6cb0e36770a5fbea7a01dafe4a90359ade90eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "WRX80-SU8-IPMI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "249510667c5c37bd25d731655d7dbf18c5fc2d8d377c0c2326810cda6d9c0f46"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R292-4S0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1dcce1bfce8c75c3fdf8a307ba7f6d0231504095e1c4e6bf2166a4cf75df29cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R283-Z93 (rev. AAF1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dcb8c9ec0cdddcf94852ac34e952a349af1ca970d825dc239075286875a9257d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNE3HG4-950 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ed3834eedb770cbb44be9357c5b05d9800ec9577ba3eb6faa3c47460d78814ee"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R161-R12",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "523e9d1bf5710144e36f9535141955dcf9a3d075fff092f6b4d1e12ee2eda562"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXBT-2807",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "16f990d85b5a42e9b762a08f69614b0c6e3f5c1236364ca38efe92a5dd729bb4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MB12-CE0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bcf637c0c5be2018d76681b66661d1e6f061c2e1366124f4ef8754c074f8a95c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R263-Z30 (rev. AAC1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "92780ca87316f207f58c61f65bc8f702fbb2881688d9819dbe8ebbbbed6e1f67"
}
]
},
{
"defaultStatus": "unaffected",
"product": "TO23-H60",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "955038954a0d1463be658fe518b6006f9fde166b67e9007f3befb9cfa62e5da9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRR7-4700",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a462c1a73072f541b6719e4cdee351d44a7cb3593dabbc6809b5b387d909eee5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRR7-4800",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "424e8b46bd3feec4aae4ec33eae1ca8658526eeb66e121adb244d3c322dd005d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRR3-4300 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5cc12fd686928c97fa7fbfda17250579adc4e7bd11e46e88650de5ebca6ed03c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRR5-4500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6ea44803e9b188161126374021e9d845136edd676d33fc80e5f9348b8d577a87"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W771-Z00 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d07d7094aa0dbdb896f8d3dceb093ea8c1d72ee0009472ece73190d2071aee6e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MB51-PS0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "372c9a6f86f60d7cef6ae2d2ee7ca0d55df998ba0a47468668c6758b3d3db725"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 UD4 Pro (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ca8a556421eb318b0e5901085e97c448f1646a1636e34ec6e4d76f4a3d61f601"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-ZD2 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c8ab653dc8a40406c0a8a4d71b56059a2f9b7c7ab9e883290acd071941c7bc25"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW22-SE0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d369b68d0c38afedcbb0eeb82f2d06d486e9c0ce212ebe3b0d9f8dfcdbbbf5b0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX32-4L0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "78ce8406e3b09a3450d41ba11c1dae91456f25c796441dabb52c7b7e261b3a69"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW32-SP0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0cd64d233ea4db6db2a90962d2888f4e5b967fbb24fa944ccbbfc2c02d5a358a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MX32-BS0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "40234a98894a9855db1a921ffe9d272caa1e5702dcdd14afc82f6a91753fd460"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER3-5300",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a3ab1a934f5806b5472f13257771924e3fcbaed289b2d6a860ec2fbbfd2d0c11"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER3-5400",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "06879fa2383284b0222247992f7d359bf5d0ddcebfdcd5b42a20ee5f46a8473f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER5-5500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "68f88269c87ecb16f9b7d9269005ce505a3498b9e3440054742481a2254d5aea"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER5-5600",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d98134626baccb58d0d97613efeae6d504b112a4f8d8849e2599ceecf55f7fad"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER7-5700",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ec439231fb2d3491a63b173bda078a128bf02b19262b3549f3a799992442d9e7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BER7-5800",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7704838038c24fa47fadd54f19c5911fa39823ecfb5f451db59271112a07e777"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BMCE-4500C",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "43cce322b194b9be7bedb247098e8b691878f238b14199cfba11af4422b3464d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BMCE-5105",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c412ba0cc85278e93f349b9fae6011982f23f8f3a7b6539a36d90b551ae1006f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BMPD-6005",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6f14b4087af44921d294462fb0d65259f18af0cc23b7ab1c5b87773b9c3c13e4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi3-10110 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6626703c5940d244a87f2967f0c54f4a5a7b53597dd92a0b561f28a2f9a9161"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi7-10510 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "af98c4cea319d387751cb356a28390fa630a1b2f66920a3202b37e0acb861ade"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MF51-ES1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dbe505cc1f3a4135628b7e22c7fddb99bf3ee1d46f82a84219e8cb0905c20ff2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MF51-ES0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d27437e85db58b607bc173e844b31dbfb8b949ea3c225e13377ae942572c4611"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MF51-ES2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9bd110e7a5a1e1cdd77af3702309d98f748cdec6d25a5e76c04f63417e2e6a8d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-Z50 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0b2bd8851706081fb9e310e5f4a7a97c3a0bb32eb7167a609e602ba6cec1ea89"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800M-D3P (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "19c85b8fbc25322544c775c9fdcee793a563d51b32ede6b29c02248e0813f42b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSRE-1505 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2f18902d7afbe8d900b6552c2d7a86760f05c4698c1018053b2fad97f6ab51f7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi3-1115G4 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6f6c034629c0d8df05227f4e7d85d02d8fa52d7fda0940fd4f80f62a23be06c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5-1135G7",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "baddfacc85e4aa97915493c4f66cde6002104bfc10ecfa3839c4fc6e32597953"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7-1165G7",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b191f4293202c488ba673c288bb5edbaf506a9835a508ec38fa705797738c918"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PH",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a5013d7b2208a6c2d1ea75bbef06711be676430321f4b275140049d6fd53f8df"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PV",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "60d70e509fc3f7c1da701e5195218f20e297c11d2dd4f0327ea4d25732c120d0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z20 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e0ae28d4aca350a31f66402f4b0f46e05e4aaf77adfc813179a7df20c8f4b148"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W331-Z00 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4f7c60d69e3c374da221c2ab2d2393794965f2e0e1cf296f5a64d4d77299089e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c5534cc441ef64739b9609ed3160f296cefda8faaae992448baedb01e9310be7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "82f181dfcdb973537274d8fbf4ad83d60ba8b7315bf99def64780a8c29c6a843"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 3 Pro",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "810a53fa70ab5b27f2dbe92948b79638dc87fe6015f94c41501562a47805e28f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 7 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ee03798b5db2710360c33566b2e61b46bc664ff8a25b257bbfb620c332d70f2b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 7 Pro (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6ca7152161d4d3a65a2d4fa707a3784811bbb7507332f1c82662456f5f76b5a5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Gaming 9 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "14d6cfb20110768c3da503050dd9222a2514aecd0ca49f2c08e64bf6595b0cd2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS MASTER",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "326280954738ecffd23930791fec6dc0ba2b9774c85886b98d33723974c3427d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Ultra Gaming (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "91933d348054953096135089baa7b6ca61dc43e9fc25dff45c9fb4dbf9e8d606"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 AORUS Ultra Gaming Pro (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "22869435dede4b52f75a6b82266b67f8930857829185f97bd322c3a72a8899e1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 DESIGNARE EX (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0a1aa3edaeb6b389a08cded1ce036ea9178527389ca1549442a35f8b1b2bcdf6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 UD4 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3716034ddd789a3e8e1c688a477e4735f228bc3acfa18b63e719d7cd1e8fedfb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299 UD4 EX (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6fbe2e27bf4b4543e39c88a4702f487b15d02a47b04e006759cfb6432d82fa0b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "X299-WU8",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d15d9bd6d7980d27bb56848643aecef336c8ff0a695e155071b7dafb1f75d08c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-Z60",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "826f711b5accbc542c3e33d607f1dd10edfb3486772975f204aa2de43bdb52fb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ71-CE0 (rev. 3.x/4.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c0c4215e8207d397914a56edf50428f01ad3676c23630ef7b8c06cf36e45a7e1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z40 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fcbed542b232be01a0ed2d52dcd3dddc101fafed3da9f3e3aa6b17b652e640f4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G182-C20",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e133210fdecf2d57cde25b0bc706437210318e37655eb22a97000bf27a02c177"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R162-ZA0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "03e23d40902c4e68730e74ddadcc716f46032774001e1b6bc606c5294d4bacf8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ72-HB0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "390cd14f2be9ff14cdcc90a9e705cc017bb2535e66b93859eddc233425998937"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G221-Z30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8e8b934cc0bd3127262a9e52fac754d64abe27c09902a78acec81c0daf883f77"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G291-Z20 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8d49dfb69b420390cf13ff8f3a3b3ab88e5dcd46a182c4ac5be9868bc6278c35"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZ71-CE0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d3b797002d243cbed1182569ffc6b5e5f6243e59ee27bbabae7362fa80be6e91"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R181-Z90",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "24be564cb337350bd9cbf409cd95f29b760e1ff872f99b27379c40b533e9f2e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R271-Z00 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "99f913a3f88561d7163bb1ed79380dd346897e577315eef71695aeb861e82579"
}
]
},
{
"defaultStatus": "unaffected",
"product": "T181-Z70 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e42a49d2674808c57b781e8b3d78613a143ba9797d1a856ccd2a62302a49520e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi7-10710 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "14c74b9b80e71d3302c13aea0dfea3560e1452a55c698c20e457c5b495154443"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi5-10210(E)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "56430f2f4f9aef4e50f503dc8397fdb20b005bf38a8b9029c43e3eed56c39229"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-ZD0",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bacd1c945c9ff1ecea3e29039ad8b742c6d040e5792bb45008c1b7f664fb36bb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z46",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "31aa7ba19f6edb9472a3da22793803c265a0cb0b7cd7979db56251c37edcfe5f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-Z90 (rev. A00)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8cc6129ba23848fbd65b91a9b70999aad19d3b7a6d168066cbe4a0b759fc5a5c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R282-Z96 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "605db3a5cf91d915929488803446e5a51dda16d661e76840b707474d2df79069"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z50 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9b0c2aaaef88b38db18e4efd44b2582c8401f9a17f2c54d0e1f07d2c94a9a5f4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61M-S",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5fb07e319cf6d523a488d879e7eeef3321e90fbee049efb642b34ad2a32611b8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G492-ZD0 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "25555956322c0eaecf58fd759ed9b0b7857f9dd149b02de55e2f5eedb291117b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W281-G40",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f7c504d3d3907aa4c7f70ca1fbe1fed7e73426eb987b9c5e2f6b31d42e801af1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW51-HP0 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1190d15905ff8656d2d0601c388df633b1646fd585de4fe871fdf93fc23d35a0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z53",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f5f61e3f93c7f6615cfdc26efce6a83b3188d697e2243643d08d10dfa9de8afb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z54 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0fe0c762e396660fb30aeddcf5a5928af864eb44399271ed975913f36e46190e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5-4570R",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3353c109a69e6fdd86adbec899e2669cce724bc35db33a86fb0bf1c81a508c2c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621 AORUS XTREME (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7edc3eecb5d5ed515e06f8130d875fcae07cb0c7bfaa2e4cd8d86862e5ecc256"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MJ11-EC0 (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3631995d059e336863527f1511894bdfc61361bc0691a430b3896fb94746aded"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-E6010N (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c9c8f182cf3b058d12bddb039d8a3f3686d1c325c9b2719ec5fc8644e066274a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3000",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2da499751e8a5446ac8445cee5b95f6bf75ded5c8ec6738eb67f5c4ac2081c32"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G291-Z20 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6d6107f0d094fab41eaf6073089de8a0b24bb7a66c5851f534a8f1d26812c3d2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-Z60 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "edd3eccfbbc2ef2ac40e723697f67a346fca062ddd6679c5ff8cfbb91d3b6afb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R181-Z90 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "575fc48c70ea9ee40f8016ea2328ebe790e7e556333a95b9b511be466047f668"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H261-T60 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6b636c9fc0ec84737f2238365e71c23e9227695cd5ad52bf40dbe8290920fb60"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7HT-6500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e9bc71596a97741893377b2c52a13b5b2ff0a7b6f985af40725e0755d2c537c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621-SD8",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6ad23c1fab3f0a2babb23e7907385e25a06801c2edd50d108e5b08f923855a8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621-SU8 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b9017e90f6c47a9d9560cfd92206c4b2e624cd91cd7f0680fb75dd972ef9582d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSRE-1605 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d72f64d5a25b9088f7fff456d3783c2fb0e7926cd4de6469c6c3f57690830907"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming G1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0455dd8b57341d5667d4c4dd71767321c3f72770f84db4e46f93d31e50b376a7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621-WD12-IPMI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0215ce75b3629651d0c64b0b241095b58f0af921cec3022c524d531c22f1385e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "C621-WD12",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f528dbe55aba35bd4e5d55fe853afed41c54d78719765944a5ea74dbc062f4b5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cc7b733f36b027823b3f501864d74397d308f8bc169149cca5307855234a4527"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1900N-D3V (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "19b4ba1388707838d0de17b6f2e9ce01f70f728926ab7e2dcc0566f6dbce8e90"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G211-H4G",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9546a8c62b6d285172acc0ca17340040cd18ff76bfe5b9e7672824e948f7331f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW21-SE0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "60370916ce5edea7899125ad1b470d59cc04b0aeccea1ae5474f78ccf187e4ae"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW31-SP0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a89940e207a6fdd61170536d0d8fe66b4584c38a804c0df15d23c0cf30d49e35"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R121-340",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d2565f697c692df559b665d0b97b3743c9de07c0ffa83b0fbb5b86aa821e8622"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R121-X30 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2ca3df4ff24732338397d64dc81509ea5a7c4b979ca3f2ee6c7446d690355c52"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W131-X30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7fb3aff9b87102cb3535bd80904b7252c40ba4f556d9f355a45fc9003cb29e9d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G292-Z42 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "09d1d8dff99b19615f14413d6ba20891819d481b12667452786510209344095e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G180-G00 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e32576a5522533c1914ea8aed13f238022bf60eb6fb86ec5393bc8ee56cf5a06"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G190-G30",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cbb6d5a01124074eda2161e53a5128e0d0d8eedaffa55b14c1dfdd6fbc5a067d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G190-H44",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bef72cba124fcef35a3ccd67b94707f20c2bfe2a4f4d89f3497affd72b8c2a73"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G250-G50 (rev. 400)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9424cd10408253ab228dc2125524340f5ca53759e3ad4e996e7cf0320f41884f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G250-G51 (rev. 400)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c17b5d0b9140f95f5317619866739be362765e6165292cb183f539b6758f34b3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H230-R4C (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "59a3fe40e2896be666fd2712f7e5176ab10ca9335b39bd04fa48867ee607c066"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H23N-H60",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d4fc77114a472bf1902a66a35f51a11689446c8d0dc18000717a5f74ae6b3a2b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H23N-R4O",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a5cda726ef82b73f9c764e39a64ceab32e4d6e238c3019e06d3b7f2218d68ea8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H270-F4G (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "934742dd01634ef45d78c2a7f9f3e89a0db2cbc7baf994570cd8b64fa4491da0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "H270-H70 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "499d17336ee9e6be59a733507c25f7b343933bd728f296f6ef08af611d0a8ae2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD30-RS0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3b9ef069c1c67a9caa29f8eaa915605cd0bbf1edb735d92abf2c4e959ca4a726"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD60-SC0 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "473033483d404754621122afe34dc8f8f47432bde116cfdde03ac38fdf2fb054"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD60-SC1 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7213c438e3f07e82dff82a5b6cdeb5f80e8b82ce6e12fc377732a8df2c527bfc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD70-HB1 (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7540b3951f0ddc6c1c1f4eaf062525f55a1c6e862022e4a545530895510d772a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD70-HB2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0db641b3a89e75061d6af75e41e365cab69a819f6880d4bd0a0f4ea7960fa17e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD80-TM0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "15f2bdadf43e6d3731df0693552d4aa4780ed958dcbe0ea4ef80bc27510cdc85"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MD80-TM1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "298d5755fa084d9268d09063222030993755cee31f9fe5429323b830c8c3f5cb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MU70-SU0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4b5caac23e6866a9bbfd7962a5557ddc9b0369cdce09b664910b35bd66e690cd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW50-SV0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cde8f07d2e7d14233748df612e113ce348140090694b96c407053fe4e6e1690b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MW70-3S0 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f8c314404f2801dc3b04cce95fa27a97f58459f9d70c8e3b03bbfd45bbaf5e40"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R180-F28 (rev. 152)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5d3bf4c8452e70a4ee31e25cfd555694af3cf64eda965fade0b21e8a262a2c10"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R260-R3C",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e6bc9c983e21a0cfcb2d86a9dc88c28e5ba33387acdff81bccd6caf780e4619c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R270-R3C (rev. 143)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6b6d0ebe479ce082420f5412fc099860ab825450e58d96a6b33c5013ea061864"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R280-G2O",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "efaf5f327a471776f0a75a2b8b7f963c8ab72190be7f606d51a0c04715dafe70"
}
]
},
{
"defaultStatus": "unaffected",
"product": "D120-C20 (rev. 230)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cef953fd8883203ef326a6b195a90328ae31ddc10736afa171b617a906fab77e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G150-B10 (rev. 111)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fe702d3ce5fdade4ab194ec43fcf6f0a070123ab547ae49b9cbaec33c474dfb0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G482-Z51 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4dcab1a378bb4cc541f210917c563b95dd678e185b4d0dc8483b175cbf9097ad"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MB10-DS0 (rev. 1.3)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3aa61cde7b1886fab7e60e077bdb39d0a94e3c451593d13e87306b88b4e56a80"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZAPLAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cd755796109542b3da08826c56951102e5034c76428138d1a6dd4f1ca29955a7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BPCE-3350 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b22a7a1693d8cb2deb608f8e3ab366f5eea0e6bdef6ddb03a86d599fb2efdd48"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BPCE-3350C (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a42535bbb37725951ac18b0fa9b5771454ce707bcdbeacb8120d0aa0eee0cf1b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BPCE-3455",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "03662e2e512cfe18afe431d968d60e944af5f7514f840754864ee4cd97990130"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BPCE-3455C",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "47b54ae65d44b227a3bab252fcd465df6e6d4875cf2511f1261f1c8e5b196e1a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-EACE-3450",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "421dfe54ac2554e627762ea96f454f95f7232f3f238dc9f5d5fc96bbf284fbac"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-EAPD-4200",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c6009503816a44e0d4fa7d0d74ac7418b6551e31e58bab97390711055449e52d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-IMB1900N",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cb4e9aa8b2416ed2fb7593a3c93d5fed07d24d1f349761a1790deb97778a565c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-IMB1900TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "93d6ae2ede6573f018ca1dccc5b686a0461a0d662a353511a0b420a10935267d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "W42G-P08R",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f0d6176199b56171ec12bd663025c664b2bf3f8b844bc90edc8dbc3cc062871d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MA10-ST0 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "00f354e79abadfb8b4aea11bb07c3ddc16f00b3055ec8c221ad4d69538bdeffd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11HI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2fdb64f2007196150cda167f3eb121cedba80d75d0b79def30c4d7155ea0b2a7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-GZ1DTi7-1070-NK (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0d274a7eb05cebe468e07b2e6692a11c90f222d18077b3d058fc02b464046265"
}
]
},
{
"defaultStatus": "unaffected",
"product": "S12-P04R (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "25b628eb776a57d9fa45cffb00f8f3347cb9d7c2f3c33712348b85c3ecad2d4f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R272-Z30 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fbf652a641fc3d847c148abb65130f7eece7a51a9c6607f1c403a8bbdde6ce48"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7HG4-1050Ti (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a0c57eb7255f99412b62429f165eeb1f8a297c26a13eb6d7ddbee91e32dbce6c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-GZ1DTi5K (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f37453e390737ec297686b784da5aad11acbaf8375d377fac533caee996c1d66"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R160-S34",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "898a0ddce89b59e6993ea651b0a0d4b54752957b63274dda75160674fa0928f6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R181-T90 (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c02c66a7d393e7bd8cf757197bbc6bc22fd9f9b38a8a1068166eba97bc5b4a29"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11BM (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "410a0aebc3826f029ee6a4cd0c5816eb0676fe99a0b112e8ce55e8b2f3b49e6d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11JI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "05cb527ef122bbe9ebe54d4678686e6a21b961f16392841f5f0b0bc3882a184e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11KI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "945d5b0e567bf5604ea9b12fc7f3f3bb12ccfb1935b9de78c9bc77241632fc9b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MDH11TI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7796142d4d8a09c6f416d5b3cd452caa659cfca40992683d7f8af55cf4e6a7c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MFH27AI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4d3a05e1006e9d5a1045ea65277cc4fba148ab4533ccb1b6d52ffe54edc7fffc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "J4105N H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3d1879acf606abac026703a7fe242feb538192ec6f01642ca33ba6d6de55a725"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3160N-D2H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bc5aa15ece1e486f4b7d31c5ba6d45382204c115e556a6412d751e25703a4a7d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi5-8250",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3584936b2dad0ff3ee3d6b167442d39dce8400e1016267462827ff20d15dcdf7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-SBC4100 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "873e676d25545b3d6e133a2c85cedd5a4627a11f67513e54e6a99e812e7618cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi7-8550 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "591b486bba979b64d20fc90bd63a5991b7df16b5aab1447de888e3d6090f1086"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi5A-7200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e13105b80056966dee303194e6eb7e2f622dccb80f5fc5780100197d43b871ea"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi7A-7500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "002c5c88a393a9da6b48c30d64bd702f6b50fef07c32f45b7c09f40fe2f3f2c0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi5HG6-1060",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "289cffe9f81f1e9a9cd087bc529701a9343084e499684caf4d34bfe8db15f3f7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7G4-1050Ti",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9d8b09f7fdf906dff7d92049fa20921927f3cfebf564455eac78ce2518ad03a1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7HG6-1060 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3835eeda7653120a02ce98ea98ba75ebce53ac1efabe3b81d0b6dcc9e611d1ac"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi3A-7100 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c5697a205b0e85c8f31e3538135e32b72ca60d1652162c30007d94ad079096fe"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-EKi3A-7100",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2f7481194b1e0a153551fbc9e68fef59f463882e3fc0238673ed6293715366c5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-EKi3M-7100",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c1cc2040975c62eabeae3df92e63b2c1a22c690a97edcea1576f83e975355db4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi5HT-7200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "47a969af17efdfe04690233319d36d12ff820901d0817ce17846281e7d5f49ea"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi5HT2-7200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0aa384720b8e5c0d09b9b0b14cf14a105e4b607681f778bcaa202412e666bdf1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi7HT-7500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f61c63e919c797c1faae135458e0db89f288a1d05402380823562f34452806be"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BKi7HT2-7500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cb0603d8ecac9baf7de500500990ad0a7e9068dfee69f296d62de549f69f9b1c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BRi3-8130",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a74d2353acccf98743271fd296b2bf6f1e047cca1fcaccc2fd9095a7f72fba2d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "iTXL-Q170A",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fa7e7ca9fd48d608094d5f56ad6f0166db7be91862666abbb6fa631055b98f5c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7A-6600 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6504f61ce57f6caae37cc7c56910267d18a1db46e6681178b6807f0e26ab966c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5HT-6200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e649eb460cc049ddac440fe93528336fa42bdd9cd7a284ad9a2481647b57e75a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7HG4-950",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b772a8c72de61e4821a04793a16c8dc8ff7b354fa2a0bff189d879df254c9f1e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7QG4-950 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f4426a3de06ca8015af5798b631afe601a78a069be9e70fc818222d9b4f679cf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800N-D2H (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ee21f7397347f3b42d5229b41f9d9a6b4be739419f6f2bef1c3eec8f5d3a17e2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3150",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "66ff6219a24fb3662b7b3d4fb1fb7937649dcf052cea4364d4c9b178735807f3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7H-6500-LA-IW (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9e23a81c581d5e6c351c2cac1a944ef5759271739f6150c3ef6857bfe401ae62"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-IMB4100TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5abc359c698cd90030a597105c4ef899e4ef56271b9e0f43c843408b9fb53d33"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3160M-D3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cf2df7d9f1ff5f087021f7b47cef6aa3efb47cbfd639f730512bc630e0c91f81"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi7G4-950 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "210688036c5ecadc5d764691d511e738ff32146bc69f26601fd45321c65b0c7d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSCE-3955",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "327e84e3cfce4cb086435232d033a20ebcd4b95cd5aa4b85cb92206f44507170"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSCEA-3955",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6e166fd67041801b0481c69bc271ae73e0657f1078442b5740b09f6774128e01"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7A-6500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6662b3f0d921aaee11ecae2893271fe861524620b05540e255d1e364aa65abb6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BNi5HG4-950",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "030031c6c1b9422a56ed44f04efa2ec84fc8a2de254f24d14989934f613d12b8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSI3H-6100-ZA-IWUS (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6399b690346ae7ceda0f8dafbca5acd17ac4d796619568a51cc8e50f5b630b42"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi3A-6100 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e7049738618fc298adb3099074b3419bcf553f0e54acd9ada2d611fe64925026"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5-6200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "044e3800c05a232d4a8821edc28aae7927474c8814a385f717010ef9b12a5622"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5A-6200",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d86ef77e6d28671ef838b314840a4ff9237798c058244805b3b3bc01010db097"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5A-6300 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8ca806b8be055f9b5df84871c469279930b34b89de515068b1cb30bfa9c3cae0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi5H-6200-B2-IW (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "40f56a09ded19979902613399e9d6c84cee02b72b7114cabac53629fe2c068be"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BSi7-6500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5cb60622a0063c6d261c5693fd423d7fa44d826e8250812f50c7b9a28921712c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3150-FT-BW (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c754aa67ba523b595de11270897af05dc22907a4fce3f4880bb372b1e18d9164"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3000-FT-BW (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "19a209b004631abf16b5f6abdbe22b3e9578e1f5ffc4bb94b6601fb612ae47f1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-7PXSL1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "663977d4a882f59c8a8791d427ef4431ca63f89ed5683a4cb6d61006f1b1c8d5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Gaming 5 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4260703c9695e6975438598d85f4046bd34a1f16f77fe797b22cb45b4428f83c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Gaming 5P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e5ddbae819b82a8237740cccc23cee00844fa79a15e18e6187854b29e7e81a2a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Gaming 7 WIFI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b767595393d045e4adb4225856611b3a51848a17495666be273823220a0dd165"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Gaming G1 WIFI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d3e85abb0959e87075f3a91e0048163e92c1831edf3c70a4d85f6ebbe5d56cfd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Phoenix SLI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fe510a8d06c948ca3e699a51d8f60bc0411df8056124d5e4a993cd526da8a0a5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-SOC Champion",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a85cfd3acbec43f545c8586b63aa52622d9fd00303bf80ff3890012032699ea7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD4",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "95eddffa23bfc032d7d65b730d49a4d87bdaa93e349fd9e30dde6a450b9a9bff"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD5 WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "36b023bf42423988805835e5b7c48af57c0b487c7308cfaf5a7a0ff75e3ae8cc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD7 WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f93b61306682c563bb68ecb67dea64f9d5b86a8e1c7cfa7fb2b4ea02a15146e5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Ultra Gaming",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "90818dd14d621360badea1463f975a367952e2a0d43e7dc73401a7ab0a2d3a1f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99M-Gaming 5 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e3b8e6db2e08d8cf93dcd44adf437d6a6fabfa7b309702b35f7ddd4c1790734c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-Designare EX",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "71337bea704f642aad176d64c9f64fdcdb9f38f8107294a417c9bce7a104cdd4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-SLI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0307e5ffce3a9981334d7eb19b13caeed61ab8074212943438b4a423b5d2a9b8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-SOC Force",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "678f05bab483e1cb9cc2cd51415c920bb4307b31ff917dc46cc44c6c2083b5bb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "295417e80fba51a322a02a7e4c35ab04af54a48355711066339743e88e3922f1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD3P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "51c5cd38074336d75c166ad86a2df881b53b4fed849b538e3281d1bcf0502094"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99-UD4P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "27abdc6ac0e50d6d6ca0e937c0a7ab1efe8d2c53c46532b68f0cb1a5fb955517"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3160",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9cd9ea2490848b03659e0e7dd7871ac815c54080e5588a530afe35cfc1ed585e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150N-GSM",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "01b2fa505a7a377587ea64b20e1a1570eb7f6567a9204ec972ae478998236a0e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MVBAYAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "86a0a4b3efcbc51e14a0a307a0efe343c7a7e3e2bae3a6e0502869f610034ead"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYAC (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "073a6246ab57b038afd9050e2dd017aefdde6dfad5d61b80bb2d5c3c71134b73"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYAD (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "be9c2feced70f810a5d08ec03dd8e7df75f9abd066a2ee30ad82136f355ceaf7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYAG (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "305b23937168ebedc60ac6756010c07e4588c48e9fe4694fb935945dbf4be6ee"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4ab2b4adb933a22cc5b3b3739e315a68c9a9a3dca20b1ae7f27713c0279f6670"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBAYVA (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f96a77ebf7806cc05507582f25810237aeaea30ef819dbe90ab2227f8a36ce8c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8bc76dc04271ff2014eaab3560bbe3177cc08eb3337f4f512c7d44b98a40d1d9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-HD2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "713c6e95151ae02f075d0391a12e47fa2aaeed199379377bddc00590ceda1795"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110N",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b66a10f650f73f5497b22a2d45d9c0bf4df9a987668c4d617e62925c5c26c388"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110-D3A (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "447d66dd22c3af2bbdeea4b2a766cb3fa4442466d0c02d62647de9f3683cd6c2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-A",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a04064b45ec7d0c5b6ae123d779095e23315e6ac1a150d4b3190909a2237603b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b1276f7ad8788d3db650a672e6ce6785d5c3922d2bc5aae554ad1b48b62dec5d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X150M-PLUS WS",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3ba7690791f1adeaa12e45dc9adca1ee7f08c99bf5f1c51961c6975d1cd14770"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "efb150fe9825a88101d934fb5a9801f970f6e734e758344062d37152e8baa1af"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110-D3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f5f374f38948ddbde29b9673cd70ce05e27af9f3be23a7bc086f37f35a68ede4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-D3H R2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ec7f01320c848a88e89d3db821f462448f62e5ae65fb4fd02dc3a5602ad1eac0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "577535df524a000747a1e15828af3de0cfe6865b0b20170d024974d6b5b81160"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-Gaming 3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "901396591f3682b308f9cfa279cf1a7f8d4cc6622a9ca799e6b5e1d5bf769f2e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6a24bb276e5c9b05ac4cca0da01e1b381245a0d217efb5190543de6ec41b2505"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-WW",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b565acd86a3f4e294d606bf6c0e42eedc4b7361f4adf7c31ee4a806b54767cfb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P110-D3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c544cd0b03384834b08b784ec0339e2b91a129ee56e7f4881101a10af567e6a2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2V DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8b02d988ee00fe78039974032b856c56e741a4594744b4f6376cbe1df8271226"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZBSWAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "41bbe9daa5808a1c5b9836a654d6c6d312ed7034c304f963af28d13eaad84340"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-M.2",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "18216a9c0fedbfa3a8c8cb3380845ff086beaec130296234d58d02d24fe051a2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PT",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "210d858cd9ce7dbb1b76277fd580e1c71214d1f7ceff46788efda64e817fa95e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2V",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c80df47ed107f7ea4eca4e15a55fce37f1578b985ed45131b8c67dce9ac2bdad"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110MSTX-HD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "55099b8c517078f75299dc02afe1f09167bcd7760c0f46546cf4f8274b54c465"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f5fa2136e6ebb55d5aa3c0bcee64bcf4506a7854ca10fb5a43b8141ff4bf1275"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X150-PLUS WS (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0bd8853cb934be142b7edb2ef31a2031fb348a6ecea1db37e466dce25bf7fd6a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800M-D2P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a08c05bf56e1c4e4d180d69266bbcb244e7e2f85259d86c05bfcf5593cfa33f9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800M-D2P-IN (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "98372c6dea313b0660ae2f1b1c80a8a5d7e93ce07010621392faca75818c0fe6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800N-D2P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "af4026ab4defc142e75d57ae35e7ef4492fac8ab6c0cc55c6de47f3e21f5ac24"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800N-D2PH (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b2977acab6438edeb2af8a4e3d0c353fd89e9b2d47082b528c3c23fbddbdcbe3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1800N-H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "464be29c2ee1a3f706063374be13365d0a296776aed73fd0c8506f1cdddb568a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1900M-D2P (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f89741fdf7f21d8670407a4b8038e75319d73486009e08a795632e94fa27df82"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1900M-D3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5641071fccfc0169979343e131d614caa71a2b334ffa45d1ee10817ccef73d8a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-J1900N-D2H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ed85051f384bd7694f0a86322c705f819cc18a0ced71d4e3c3946b37d4f3abe7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LASL (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2c0e4341f91bcedf78c301778d52492fa304380cdd15bdda725910cc6709e033"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LISL (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9a8e636b33372a34e9719b8b20d2073bc56f549b64e5af83fe617187a51b97c1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99P-SLI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fa52c6150c49a84699bec9739b84f5a2c073f4f69b1bc84028f3b2cb15b2167f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper B7",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "92311971e888a24238c48086febf47b2d0820856e514dd6308575291b6de4e48"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper M7 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6051ccb31aaab7240147a1fdf9b8f444c7ee4bde73ffb4baca63b02bc77dea81"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper Z170 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3df7b53ef2284dd2f3385aaa589f87f2e3fadc93d2755e28781452a273d999ec"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150-HD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "878450f31de9dd84201895e81547ada2085ec94608d7fb6bdf84d73dc3b98538"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d1d3adca998106090f4b2f08d6c50769e88e944ed640518d23f8865102c2ec0d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150-HD3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4cec11820244f485baa7f61d50e60a514b0c5aedb87d1a26cd6b6fb153fdf9ef"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D2V",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fdedaff9a18229027689f23bef37cd8424e248412137bbf710fb6163eac6ac43"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D2V DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "da480d23fe57a6003e41f8c88e2aacbade99186f0b62ba4561663b346e9f96e9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D3H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5fd1eb03f29343e1ba70dce50264a7143129fe60bde396f6e3715330623db8de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D3V",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f2da89fe72acf6892b139fd4f7a047c30eea75cf5c572da6f901511658ae1522"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-DS3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b3148d78c2efd368e986a43b19e209f2ad4817e8a4ef41bb79c57ec7b9dc09f3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-DS3H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "086d80a421ed4cc907120e6c96117c3b69b9edaf2ef6951fde7d3dbe6ea4c878"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-DS3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e69ba3bdca3335f01b749abb84c702f6f926eab3e4d6ca70dd5ab84c3aee24a2"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-Gaming (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "639cd1a8d45af689d2fe1aea44b62d2110146b314f39be8a5d472e412842e61c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "94a5124370c2d66b38a568b3d8be4a98dd8d2e25313b68506f7753c4d60be97e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "825b4bc9bf807631611cd33434d1455bca3d412b9a03463fdd1092c54d5ebbfd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150N Phoenix (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "12886ede3cef3c93c4602ff26519a04c9143e903b103006ca3805c3df2744c8c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150N Phoenix-WIFI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "330f761ad2d43d72a4a09776d76bdffdfdd88d4ddf6002e0056e2826828372ab"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fddafb4af375516cb2f72c9308852c88738a66d57af9deb08e9a10f1dc983499"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-D3H R2 TPM (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4ecd2f653fab0c6dc0ed24c68a8f04c454cf8dea68b58d149e9d79758aac2c54"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-DS2 DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f71a5cfc0646d85af2847e6816752e81f3b4d2a3ea5fa94516aed9464eaa4024"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a402dd098614ebc89fe70642661c52da9ed9ba0b21627cff4868defc97db0274"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2e24220caffd6ba7c7e1835f12740073a9e3a826a1ffb9bca210756c224eb99a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7802bf1fde1f8771ff7165acab0474471598a46df398d7db84adf911d2d37260"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2HP (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4b0a77259b2af63a9704b094688237ff3c29fac1c011a373a0f2537a8a543d1a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PH DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b73d5f184db4524883fae5f01e681f52371964740bd6fa957998ab4d65537732"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2PV DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ebd6b43db01ccccaffc4a08182e03cf6633d5371aa69c82f7300141277fe7d7d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110M-S2V DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "756777ea660defef2629b8802bcbdd29b61020fa8ae8cb07045a7d5f991f3508"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110TN-E",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "879f28f51c3b235744352f0808b6267258131f2594f3ff85a6938401e73eb9da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H110TN-M",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "50f77912004b73bade539e1c3983a7ab78984b8590a64d3e030ade4352c49eb0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e4a209b19361c13d7a18fa41d8a257a22f6c806bd62f04dd24cd77abd7d3134f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-D3HP (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2e1be66c511bc8367a2b1ab41a3ca60cfe46648bcab2d5f1f5bdf5df14de1c05"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-Designare (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6ea3c21e1aadbadfc2e9ac0860d94eb87e6590ab37f98326e00b9615a13a6208"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-Gaming 3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2cb69c081c6413077fd076d7230ff816931ae65bbead2f94f0b12d33e1861c9e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-Gaming 3 DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eacba20ef05b116d70c6344a54486bb7c23a131d7c897f5399b9a084a5bd5205"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "38643b383b7d51cc53298693e108cc293779dc43f254b2e2b17f66a80f9e4175"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b3cb86dfc649346ea7ed4c8ff117ca91b59435b9baa9bdd8e6f2bde1dc1b1124"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170M-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "60a230b0a5722bfbb364b6d64ae3e1b1cccb6161bbd6f8cc034977f4d283b4f7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170M-D3H DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1c6801b8a7920939facfa379b6141016651601971156e426db947ca40b6f1708"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170M-DS3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b9ea15324d90a1b750cfcbf964321370a56b116b44a0cbee2035cf11ffcc0ef8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170M-HD3 DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "78bff3425a6b42b846508850f03a040c22c43566947ac1d039b431fb80a31451"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170N-WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "03299dee42886b0856629da99bce9cedee322b80bfbb89aa6943913d2da15e03"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "523817566d04fde3f7fc0215b4c4758243319affa5c1819e4f041c290a36970f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-Gaming K3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "db4668c191b9266a2afbf974c348885a9d10a3e1750d1e100418aaa896a5a103"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-HD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bf0aac3f13b0d68c6a255735eaed4000c7e5f09748818746b4a1038f0be34f78"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-HD3 DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bceea4f950f07347b40c579223456984c0515a2cc94c4cedbbea3c17e1c459eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170-HD3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "20607b0f670b297b45523730d2204e46603cb3c65f47e6cf8293b07b7b1178ec"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a34cb81eac53b0800c2c02d2984c0960c0d68a22707869befd4af3996be42e7c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170M-D3H DDR3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fc0eb68179f1363c19896c7cc043021a57cd45a3492187829b329474c361722a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170MX-Gaming 5",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b87e20d143fef2fc32233444070130834ce5dbbffe06409cb537e59c911f49cf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170N-Gaming 5 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "209045f2bba172fb91679d4319cfe548c24921f1e28dd9f887e3a78bce515e7c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170N-WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d67b82421d81df8f3d64966609e3c963be6d0dbd87df531ba5f3ef0bd61e5353"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Designare",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c061fffcfd8d7e38afb97fb434afc78d39d22bf9b02884c7c1b04487cbb7dea7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming 3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7b1cb9593c0c1890a7f1e922777c206012f2f1ded7b3339d66fa49efaca44c74"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming 5 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "438bf66c9433bfe1ba92452f5f7eb1d46cbdf9af9ab3c3d1d4354e902fb0f257"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming 6",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "25917f5dcd5f5a4c2daaa9fc0cdf991b365e226856202b4e5e987d406e6af95b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming 7",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "75468e84df86d3133927f5c08028dfb6dce55168c99ec9fde08397f5ab0865ce"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Gaming GT",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d40ec6b83d08a885cb576844e609105e15fdc4e48181dbc861e2bce0b657b59"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-SOC FORCE",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5c25f790a4eb79b4ad3c4ceae05329c0878337257a6e31c276ff7aa5c18accc4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-UD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6389e5f47ee85c43b2d9aebef2e0c8a9f06856fabb148496a8acf251cdb3c1c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-UD3 Ultra (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a01bb5e701b3b847766d027e7b9bed8e7bb05403ca0160734bc73c93fb77b6fc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-UD5",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "260811f239a5a92f4a894f52c5b7218faa75c5765e3db17a4ee33530bbfc1295"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-UD5 TH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ad921f429c443cd2a73ba3373fb6407a81b4b8d53b3fd5cbea07ca847ddc75c9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170X-Ultra Gaming (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "464643065d45eeb1c2566dcce90bd868313319547c91d46e3cea78126109d374"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z170XP-SLI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "32d8482434dfaae6405eca2bf724939194c8740da638c9e3e8b760489b2a1128"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXBT-1900",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6b0b62e4ea23df186b7bbf0fff342ec107596e1fd249721eea75375982054535"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3160N-D3V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e03efb41e61ac04cb14a63c5ee5a71d3deeddb29426e38eab1c68946d60e26a7"
}
]
},
{
"defaultStatus": "unaffected",
"product": "J4005N D2P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bae6e219e1ed8e8164382c4f05db847386c5f2908fb2fa453066aed4531310b4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BACE-3010 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "aecee44ca1c8bd43d65abeafcd5f0085e1165d42baa953808d566005189746a9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3050M-D3P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d4c55cc53de9adaaacd9e70527becc4de1cb0b39a605791601fefcd0156ced4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3050N-D2P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c717a5d6b61b22bd458dbb497dc5abad9e30fedb668810e558a46f994a656435"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3050N-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "63cd7d4698c89b720c73125900f4cba4b8b1c2b962064280a93dc9ce2a0e9549"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3150M-D3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1c4cf96a2ce5bae121b0594c2b41664510cffcdfc4001072f2275964c20fe12e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3150N-D2H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4685e5a58d4cf84102460110a5fad72931b1b46eb9f71650811832f80580bc0c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3150N-D3V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b0474259effceedf7aedde543afa096fdcca74d9865eac223b6a91b4ed922310"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-N3160TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5f53230a65454b8805179f246ac3c8b36bd274ae0051d900cd04890e7b765555"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B150M-D3V DDR3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8ba0474e2bdeb945adf9a819854cde336f3cca848e1ac41e381aaf03d397c7d0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X150-PRO ECC",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c6ed04464891a4cdc3a25ba34d3cd44599bd118ed953c68c8b63f11be2dc83d3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X150M-PRO ECC (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "764d56cd4e5b88fa97313d5eef173bb426aa27aef5d81794eaf5b9c1fdf38375"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X170-EXTREME ECC",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "35f6ab275afa77bb30a5672f32b196d8c76208e48500d7f381e05f8f12e400e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H170TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bbb58a67574c989b095f38c9fe031cadd5a709235d6e0bfc9a206f98fd5318f0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-9SISL (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "493437a68a7a7b46b645d46660e17c3b6599eee86cd06f592683e56963cf9a8c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-S (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "554e7be483afb47c81760179da5199ebe2f59a97b7146e50ed42f35728df9c5f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68MX-UD2H-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5bbd2f88bf68b66e974356e0e49f63b83fdeea8d148da445e24073d8012c0c3a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD3P-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b7981e34bc8994973c48a18ac01d6b075f092de47d35fc62fffdc503ecf081ed"
}
]
},
{
"defaultStatus": "unaffected",
"product": "EL-30 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "485b963baebaf9e0d0d3f0438da8fc3a5e74cac6fc7781e732df5ad0a3be3eec"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61M-S2PV (rev. 2.3)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9e2baeb611484b3c3460fbabe2b48ad91111e9a0cd7d1f189ab2d0438a69b3dd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi7-4770R (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "73f5c64009c9b8ce26c13399584a65b73b3b5201475b04dd9621f5433ef959da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R130-134",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "923e61ed9ecf1c37848cbe56822ce753f455fddf25c1eca816f3ac04aa46daa4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "R270-D70",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d5844b2dc05f8374705493e1d67700d0421f63c27ea10070c60f1871dcf540c6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "P15F R5",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e112ae0d90739fa839e6e29687412b5669a2f23bbe2b418d96b65ead135ec349"
}
]
},
{
"defaultStatus": "unaffected",
"product": "EL-20-3060-32G (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8e0251d4518373ebab7aa1dc037d732b5c04e92306e16a8e8ca1479df0a9ae88"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MP30-AR1 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "586ca26deb275734620c0b80c8d16dd86538bff6116f5d7db1fc10230d775eb0"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-KMA1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5b5b834775e9fa3cb50db4d25d9df7849cf0f13011a209fc53c51245aa963856"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXGH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "984e1178ed45439578fc0b3cc2787cc8f972987c087fc5b4762ef5f421cf5782"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXGL (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "240c0e6220a07f27d4debd867f2a1774a50be1b37c3f53a2dab272a71280af4e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi3-4010 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "10cef05010197e635c330548e99ad98827223f0c8eada8a6e5a95ac7dc2880fa"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD3H-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "9387c8f1b5d856bdf0ce43c88413c22f98214768708183bc610381363dd269d8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXBT-3825 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6775386a28b32b93d1853880a8ccf1b916a3bedaf7ba4d34f2a64904de792417"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-X99M-Gaming 5 (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d11d8f85507e54952adcfbb82d5d58ecfeec7674b756ba62c8e1316d9a1500de"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G210-H4G (rev. 100)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dd75c90a2a81a34fee2c17a6e72b8ec2c93120fbd98c437c4648ac5fd78b6af1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSQ77DI (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "030615cdc1d2e52fe185f8fa8e6e1c1028beca283a6be9215482a39df1418622"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-KMA3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dcac97ed60b61b1991fc9f499fb3bf0e8594d49d102e76a988ea8933d099d396"
}
]
},
{
"defaultStatus": "unaffected",
"product": "M9M3XAI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1d3295cec309f0649ecec6952824abfad776ecc1f46199a080932b5e99ac206b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXCE-3205",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "a080c1d64fb844389bad75a733e3b4c5483b07623276b114575d5cba32170869"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi7-5500",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "14dca67fdba7b20c48d3c16446db2a648c79e5f94712afba6e720ecf04ba5223"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B85TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2d817d05c86c92a00f00e286c6c26cc52e6a50019970a71d98aa07c53d9690c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H81TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5ebbac1eb55e763bd4efa47f6232ecbcc62d73645c3291e00a3d5cd880898ebb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H87TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e555305c3219cca7d7b8d5a667ae2ef454aca7eb84341f07e1fa8288cdb38359"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Q87TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5f237b90cd70e0f63c0414262a0af2fbf8456ea78252750ccc6ef7fe59cb8774"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi3-5010 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bc4bcea45075ba867a4aadd97494ddcbbe693b23131bb52703d3c42b41340719"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5-5200",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "39b90d14141556595814f43afeb015cc34e75acc31d23b0c505ba00d1c4a6a7c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MATMH81 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "dea93336a790f6ce8a80f451d1dc454eaf29b034a38a802140937b3166c4d450"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MZJ19AI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "51ebb3341dae5033164b3b45470115f49f327e5dae5ab111df2a59bc04afad8f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H97TN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "882fa77c019e12dc61165308318657941c1b15c1259213e78aa035017fd50445"
}
]
},
{
"defaultStatus": "unaffected",
"product": "U21M",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6fb97ce4f81eb4d83364b9377cf654a6f0e8d9271bd8e1e9f45f78b07f838172"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXPi3-4010 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8a4342c4bacccf07bdaf52b9cfadc8789c37092ccc0c414e1848e4d0317d01b4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-SIOPS-J1900 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ddff03dbd491004d20587de561e976bc8b5b5366723b51d3f59dfd1892b9dc25"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-TCV2A (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "70c80b940abbafb0d631870322b5f7c8e306a2063097493ab471f0ba8ddd228b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MQHUDVI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "092c46188af77b69b4c19e349712a23244ec7cdc885c2e0150a8209c1693c95a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-SIOPS-4550U (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d3d7862eb46bcec3f0eecb5ec94caa94456def40792a125cb9b7912625be5973"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXCE-2955 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "161c97b5c0ce6cc90a70034d8de30b18d07c43e50d5566c1802dadc967cb05eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5-4200 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "05001b41f2adc9d6c008f12f9d1d9669225a2366c9a05f6bd19d420cd5b13fc3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi7-4500 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "6f6b51ad77bb7963ec455923fa731323ceb72af167a0a40b8c2b91696301bae1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61M-S1",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "19e2a33d2a28a825fb89e7dfda9609776110876b204c5ff760edf716cc7c390b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5G-760 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "faa729af295c234dfcfc5ac4ab91c8c255c1b054c612b9cbda1fce33f88b4d51"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi5G3-760 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "718662066149651d1b7506c7582df2252c555428481b1821829b4db25e2a836e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-BXi7G3-760",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7452bdc99e762f3b54571e03c1b6ab0873529b798275149fe0a8bc057929f8c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXSL (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3448017b88b33e3949d6c18876be32e506d827f65de6c425ebf82f33a2c3f502"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXSG (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eb08694cb68b19cc7bd0bc323a46e8ce6de5036078a61dc8827ee480269c88eb"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LASH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d7f1a6c78df7317f866866e74e881d91485ef816e492fdf2a6fa02b940629494"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UP5 TH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f0e7e5b4689bf7e81db1b56185b2a1186d31a50f1cfd1c9863a0746f490ebf3f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6LXSV (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cc9b6fc8540a6abe60b8966ae6c4217180cabbb3471d12f93e3c81dc206c8bd4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSH87FI (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c19f30c4c9a444922cb61cf136cd48d9674d2134b98e618f6e7ab9654eb7a7ef"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-D3V",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ac8e4d6a033b6a2d130404eb06e193b248a76308d4a82eeb5736d4f251af6826"
}
]
},
{
"defaultStatus": "unaffected",
"product": "MSH61DI (rev. 1.2)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ccb5cecbe797ba2e130f297ec86bfbdc629ebaf919065e50d3f8911cc05b3a1d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GB-XM12-3227 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c67607819bad2d7abfd1d47eebad947f9920352c33b96db61f9f25c05bddc7c5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f5502f7f96b9ca121d3b52a1a804c877839e76e3dbb45beda100bea672067d26"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-F2A85XM-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "104c3173aff7cbf07c72956516cdc7c34e6169604293aec90e86bcc4384a799a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d4c6ce9d730179b7a5cab37a8744a2ca588c9a2a8b8462b62d2c96757adaee61"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77-D3H-MVP (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1ca64768668cac95b2c49594df5412492fd3e84a5ec279f5e5782d9d08d641e8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0d28128151819a06848aeb241f3dc4737d3a9b3918b739f8c512085af375b368"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77MX-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "32b1eee6b2e1553ceb902d17d0ecf5534034685dc8c2863f9ec99d2dc587bb72"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77MX-D3H TH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "26778248ce3156bc2d3e70461f079d1292435aeca9ea2c6ef0e536c979845164"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b51371864d4322ca5c584cded0f6bbad11dd01cf498b841b270ede1f03497137"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UD3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c27a0ca23c6d3ee9eea18c0e700f33f13c568dc209341b8ab4b64148a235c70b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UD3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "023f4c9928786909d9fcb2143edcb1ce9a20d1b15cf281559996f21617503f91"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77M-D3H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "eeef50c6dbb27c9ae8bbca0e2be73384ba60469957414bc2943892ef28836b4f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77M-D3H-MVP (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3c50ff8443f151a8022b4934dc0e87cd74d500719b586c82bce2184bac3ec2d3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-D2V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cac095d827e58ed8992e3eb2bc4285823c8378247de15d7ddc3f97c79d275f8d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-HD3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c3d754d426defee4e705ab9b72862764a22a64f316a1f8a2563a72cae308c31f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75N (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4a901cc6ab10bd1546d8453bd1bcf75379880ee549329c03ecfd4b445b52de99"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77-DS3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "58d19c2ca76b765809a99f0eb2227291f4f51860723d303f9ef0cb20d4d19dcc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77-DS3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "98d605b3578ac3b7518f151c24c937455b204441ba806ea244f22e54c03af2be"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75-D3V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "8222535124cf1bf77c3af3e6ce3b3a942390794440b01f8d2fd44b4e416b049b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-D3H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "33793d37f2415d724c58c993c2ad6cc67d661253b929165f6f0ab0c88c8325c4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75M-D3V (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "235c6f47146d2bf5dd20ff3971421489c69517be3b467ec1a2b6f7dc0f2d8a94"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P75-D3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1859a1e462fbb1db039e99f7cfea16e6da59188ad37b313181211ab2c3d70150"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P75-D3P",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "901658f7361b4d15145d07de99b9d921d7293699a15479f086f4d1a00fedf089"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-F2A55M-DS2 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4be0b29ff5fd55d855e5529912b92acea24740eb7fa0250ba01a44824c4685b3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-E350N WIN8 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4fd09df247091f6c6ead14d012325d14055ab38095f5c4d8c258352f48c2052f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77N-WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7e95d1a64976573e5ed1c8c3466e24037d33fcfbbd9f02d1ae69643fdaa44d7f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6UASV3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "00d23573a79d5737cfc6a1094b12e22c8a8601618934193dba2242f0246af559"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61TN (rev. 1.1)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f19c7fe7e25a9a41b4065791fa390b8d79ceee0cc7fafae702a92a6ec0e86696"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-B75TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "506f5abb01dade2137a4b8d3ea42d1127f24f59f96339e77c59883571ae63443"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77TN",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1ffb3921b21ffdb876b2cbc7b6ff939fb5168efdf5ceed571d2d220e195fb150"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77N-WIFI",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "25c38be153f85659377f63b4968f5425bf7e8d6c99fb695eeaaed973939bd943"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper M3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "bcd286446cd358474b492a2c9a4d49eab652aeda52c0e69ef94b1cd12b7579b5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H61M-S2P-R3 (rev. 3.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "0e26169fbddeb0ca9b8283dba44d571b554487b5dd9348caf84fe9d7a6a20dcc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD3-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c0adc82a52cbe367efed31279d6e1ea3ab98311db49a68ae149e4af9a70ab67a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67-DS3-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "ff5f5836457aa7fd0f02d037d0dc23b5c5a49fef8f7360268d7276e577060256"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67X-UD3-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "b8fb25742a7753c0f7ebac50e9e3d6186ea123dcd0e33eb0a64abc111eaa7728"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67X-UD3R-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "435e0ba0715afef2a466835c19105c6480a35f921af59b863f2c29ed2d1de0e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68MA-D2H-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e8d1572bf6bb0b658f618c735322e6c1aa20d01b79c9100e3d177b6c27ced480"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67A-D3-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d36182899b2c912ba34f51b50bbf228e1ec367b0fc009d20d34e4f011f4e9fc1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-P67A-UD3-B3 (rev. 1.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c46c76138b4cf0a3407c3fe2844c11fdd5c0c2c4d335ab58aa0b0617a6f13f33"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD3R-B3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "50d3dc2e80333527177e5f5e1dbc06357ecaae3fa2dd1d51272a906ade3cd7e1"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68X-UD4-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "beedbc9f64d20973229b584d965bcaf2f8fdc4a88c4bc202eb5e9f5565c85fa4"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD3-iSSD (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f615668a861c9d430afe7b40f42f352881132d193d16426951563997fbdc81da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD3P (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "1d3552918dfc84151da3dabc0687a4513f1dea9d6879d53a8b8646398fc462e5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD3R (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e4f33b57947d45b3e43bdd7bafd68d2f4c799fdf0b72a8a2ca61319ab760ae67"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68P-DS3 (rev. 2.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "5823dc1fbc95d092e02519c069c4fd111783428757b969fd8b9dbac1009fe91e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-D3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "384d9e1e3cad82b7841f33115dbfdf38589420716c8c0aa5a190971a44aa39e9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68A-D3-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "2065b895916edbec17057603ba98779b4bd10cbfc3477a87c767a36fb027b76a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68A-D3H-B3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6c9d4c8caf3307da9b1d6543e00682a3cddf1dc06c41f0f973355cb9c8554bc"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68AP-D3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7013aca3c062f040cf9d0448f7e2892101b30e5956915c8dc3a53c3c2aacd13d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68M-D2H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "d6d451499ebe6d8dd621f1c2ebb00b87dd01f7870b791e682b66d5f33eb01d8b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c676efd7e6c8bf4a7d3da8aa51b2b564d77c67f6d2be68b25232326166e0c20b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z68XP-UD4 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "4ae3a48e1a715461671107f9e8e790cfd1c4ee4d2b8ddaa50b140d67622b920f"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-C1007UN (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7b2aaaa9f92c0e6fa23a59bdda27d5cb26e8fdece26bc756893490d3ee657a4b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-C1007UN-D (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "fcf7c3d07e1bf9f1347e48dd3ac6e45fc9492648985a06394ab6568a7a71e262"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-H77M-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "e3b619d396378c2e6bc2f550cf1c55cd17e7091fa4ab90761f32582eba28884d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "G1.Sniper 3 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "cfa61511dad005aeb4ab01678f87169c7d509d59042b2fd33e8b58bdb34febe6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6UASL3 (rev. 1.x/2.x)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "7196b64c2f89763d2ea7f0f106d06352ae2c0e17a83fed2d10548e1aefa39245"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UD4H",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3ff3a0cad413c0b862ba515d60cac0e98e373e199f0d92c79a77ebe6fa6a2247"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Q77M-D2H (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "43216a565586f1c49090c7982e6f3c1e41b179e430d7ac0c47c8ad07308a5bc3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77-HD4",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f6cd8446d78da9720f06cd360a48e9b6bdae33e342e18cb05420adb78fe05858"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77-HD3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c1209a2eb0b5eb9324e1a8ce11c77ca141023b94b988bd1df4db390dda4c275a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77P-D3",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "00fa676c6d12df8a48049f39b87e3343769356e880d2abcaf04ab1b679c450f9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-Z77X-UP4 TH (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "c5310894b9a2bb510f37c49852d743d64343a698436ca22d9b7a44bcf20e447a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Q1742F",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "350cc51e5e7fa472e95460eed374eb1f9a43ea4e615e2654c26a9da4d83bf529"
}
]
},
{
"defaultStatus": "unaffected",
"product": "GA-6UASL1 (rev. 1.0)",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "f86f7ad9ffbc7437bba6bcf99d08b8de38f945bedff00c2d35362387077eabea"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Q2542N",
"vendor": "Gigabyte",
"versions": [
{
"status": "affected",
"version": "3d6faf2792722d1b9fbff087e4d85ddd2a4f9922a7848ed4db99284687df3b23"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-proone-400-g1-19.5-inch-non-touch-all-in-one-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "642290f1b37e616b64b3c6b60921e24ddad599a38e67cd46a281b24c1ab62bb3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-rp5-retail-system-model-5810",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "2a090cfc69ebd88dbe2e2e9c52a7f3a75b8b150478e30a752c5c0f09129f3bc9"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z1-all-in-one-g2-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "d0a54ae69192d2d0289b2c9ae33a6ffd0a0db78189b41b032e18a3452c878eab"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z228-microtower-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "5174331d57cf3392012b00a6de381ee7a873f7fbd217bfa3e744b7dd6136807b"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z820-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "b02cdd16e398c2f31e9641d27d99865c404357136f857a1e2dcf2f7479b9457d"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z420-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "05e89382e73afb280f637acbfa1029e9107dd30c78df37b6a00f184657f5f2c3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z1-all-in-one-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "b6fd5cd3364bdfa459f040c1693b879bbcf508513124bb95b5f36743efd8e73c"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-z220-convertible-minitower-workstation",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "cc5a9c2d4827e9b1501c2dc0a464f580d4a2d65e4ff83dbab548e51839339d06"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-prodesk-400-g1-microtower-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "289f0fa72150a52f2b71bc6bf23f343ad9c1c412aa5977e89ffde7474562cb18"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-prodesk-600-g1-desktop-mini-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "a80a5c395fd3b28b0130d4579dd3e462f9e38bccb2a42cc5245cedd70b27ff0e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-compaq-elite-8380-convertible-minitower-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "455164a23e14f8cc9567b458dfb85106294f149f0e446d2d8b4036551f894cf5"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-elitedesk-705-g1-desktop-mini-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "1650cfd06bb698ad3cecd9e0c38b0de04d29f9c397492ba70b985b033e2458da"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-compaq-pro-6305-microtower-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "44988d41019bf5c7989b71e966b97752f60c835ba2300c7d55323eded97c21e6"
}
]
},
{
"defaultStatus": "unaffected",
"product": "hp-elitedesk-800-g1-tower-pc",
"vendor": "HP",
"versions": [
{
"status": "affected",
"version": "659078fcdff1dead57cd05eafa0af4de667b52e981d1b907f0d963b41902dc7a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-10w-type-82st-82su",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "69dae6e64125b37fa0ee09f5cd9bf3581b3244e99d9b4651395834f9eef021af"
}
]
},
{
"defaultStatus": "unaffected",
"product": "thinkcentre-edge-62z",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "b04cc879ac09941e714a8ccce371111bcbbc8d7b1dd1ecdc823de09fd2dad7b3"
}
]
},
{
"defaultStatus": "unaffected",
"product": "thinkcentre-m72z",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "4438137139edb1e04de7e265e94444e1c87316b0821178285d87763f00bcc5df"
}
]
},
{
"defaultStatus": "unaffected",
"product": "thinkcentre-edge-92z",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "e37c7b66aef1c9702b08f3d08a41edf3e4617fc94a17f318297506868e1d254e"
}
]
},
{
"defaultStatus": "unaffected",
"product": "thinkcentre-m62z",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "76c5461e86a33095c4191aa02ccba85cdad5f24ac9c816fb8ab6f408cf32dcdf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-62-desktop",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "73a8fdf89ed1a2d0af45142f4b4498545ce4182ca704ad2b292490263480b1fd"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aio-510-22asr",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "47affcc25ded66333920985902473398438b49dac28be82542062ddabffec3c8"
}
]
},
{
"defaultStatus": "unaffected",
"product": "aio-300-22isu",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "a6b6a2940a5f4c98e2f531624707fd8ab7dc61f4b3d3de0457fe00ba3cc5c135"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-c460-all-in-one",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "1235ca01cc48484db1157b312ec1632c45be511cfbff28d25404df0a3df47148"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-c365-all-in-one",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "7cf94927f6826886883baf229f3cc2f2545588a564ddb7583f2b52853aeb5b21"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-erazer-x700-desktop",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "8dbcebb69c00242f0a346c34776171061d606262f412e92f84be99301d413c21"
}
]
},
{
"defaultStatus": "unaffected",
"product": "lenovo-h520e-desktop",
"vendor": "Lenovo",
"versions": [
{
"status": "affected",
"version": "0ee94a5c0d4b93a2a1618d144bb0a505865a5d308c484c80fcf26fe31f23617a"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Multiple",
"vendor": "Supermicro",
"versions": [
{
"status": "affected",
"version": "https://www.supermicro.com/en/support/security_PKFAIL_Jul_2024"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Multiple",
"vendor": "Fujitsu",
"versions": [
{
"status": "affected",
"version": "https://security.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-FJ-ISS-2024-072412-Security-Notice.pdf"
}
]
},
{
"defaultStatus": "unaffected",
"product": "Multiple",
"vendor": "Intel",
"versions": [
{
"status": "affected",
"version": "https://www.intel.com/content/www/us/en/security-center/announcement/intel-security-announcement-2024-07-25-001.html"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "Binarly Research team"
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability related to the use an insecure Platform Key (PK) has been discovered. An attacker with the compromised PK private key can create malicious UEFI software that is signed with a trusted key that has been compromised."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-321: Use of Hard-coded Cryptographic Key",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-25T21:48:41.125Z",
"orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"shortName": "certcc"
},
"references": [
{
"name": "UEFI Forum Standards on SecureBoot and Driver Signing Advisory",
"tags": [
"product",
"technical-description"
],
"url": "https://uefi.org/specs/UEFI/2.9_A/32_Secure_Boot_and_Driver_Signing.html"
},
{
"name": "Binarly Finder\u0027s Advisory",
"tags": [
"technical-description"
],
"url": "https://www.binarly.io/advisories/brly-2024-005"
},
{
"name": "CERT/CC Advisory",
"tags": [
"third-party-advisory"
],
"url": "https://kb.cert.org/vuls/id/455367"
},
{
"name": "Binarly Technical Description",
"tags": [
"technical-description",
"signature"
],
"url": "https://github.com/binarly-io/Vulnerability-REsearch/blob/main/PKfail/BRLY-2024-005.md"
},
{
"name": "Supermicro Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.supermicro.com/en/support/security_PKFAIL_Jul_2024"
},
{
"name": "Intel Advisory cum End-ofLife anouncement",
"tags": [
"vendor-advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/announcement/intel-security-announcement-2024-07-25-001.html"
},
{
"name": "Fujitsu Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://security.ts.fujitsu.com/ProductSecurity/content/Fujitsu-PSIRT-FJ-ISS-2024-072412-Security-Notice.pdf"
},
{
"name": "Gigabyte Advisory",
"tags": [
"vendor-advisory"
],
"url": "https://www.gigabyte.com/us/Support/Security/2205"
}
],
"source": {
"discovery": "EXTERNAL"
},
"title": "Insecure Platform Key (PK) used in UEFI system firmware signature",
"x_generator": {
"engine": "VINCE 3.0.6",
"env": "prod",
"origin": "https://cveawg.mitre.org/api/cve/CVE-2024-8105"
}
}
},
"cveMetadata": {
"assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
"assignerShortName": "certcc",
"cveId": "CVE-2024-8105",
"datePublished": "2024-08-26T19:15:11.237Z",
"dateReserved": "2024-08-22T19:50:07.296Z",
"dateUpdated": "2025-08-25T21:48:41.125Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-41912 (GCVE-0-2024-41912)
Vulnerability from cvelistv5 – Published: 2024-08-07 19:54 – Updated: 2025-03-13 20:26
VLAI?
Summary
A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware flaw does not properly implement access controls.
Severity ?
9.8 (Critical)
CWE
- CWE-284 - Improper Access Control
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-41912",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-03T14:36:16.370155Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284 Improper Access Control",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T20:26:13.846Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware flaw does not properly implement access controls."
}
],
"providerMetadata": {
"dateUpdated": "2024-08-07T19:54:47.266Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_11006235-11006266-16/hpsbpy03958"
}
],
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2024-41912",
"datePublished": "2024-08-07T19:54:47.266Z",
"dateReserved": "2024-07-23T15:33:15.305Z",
"dateUpdated": "2025-03-13T20:26:13.846Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-42400 (GCVE-0-2024-42400)
Vulnerability from cvelistv5 – Published: 2024-08-06 19:51 – Updated: 2025-03-13 17:20
VLAI?
Summary
Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.
Severity ?
5.3 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise | HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10 |
Affected:
Version 8.12.0.0: 8.12.0.1 and below , ≤ <=8.12.0.1
(semver)
Affected: Version 8.10.0.0: 8.10.0.12 and below , ≤ <=8.10.0.12 (semver) Affected: Version 10.6.0.0: 10.6.0.0 and below , ≤ <=10.6.0.0 (semver) Affected: Version 10.4.0.0: 10.4.1.3 and below , ≤ <=10.4.1.3 (semver) |
Credits
zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.6.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.6.0.1",
"status": "affected",
"version": "10.6.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.4.1.2",
"status": "affected",
"version": "10.4.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.12.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.12.0.2",
"status": "affected",
"version": "8.12.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.10.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.10.0.13",
"status": "affected",
"version": "8.10.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.5.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.6.0.0",
"status": "affected",
"version": "10.5.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.3.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.4.0.0",
"status": "affected",
"version": "10.3.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.11.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.12.0.0",
"status": "affected",
"version": "8.11.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.7.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.10.0.0",
"status": "affected",
"version": "8.7.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.6.0.0",
"status": "affected",
"version": "8.4.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:6.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "6.6.0.0",
"status": "affected",
"version": "6.4.0.0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-42400",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-06T20:27:16.617985Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T17:20:31.058Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10",
"vendor": "Hewlett Packard Enterprise",
"versions": [
{
"lessThanOrEqual": "\u003c=8.12.0.1",
"status": "affected",
"version": "Version 8.12.0.0: 8.12.0.1 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=8.10.0.12",
"status": "affected",
"version": "Version 8.10.0.0: 8.10.0.12 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=10.6.0.0",
"status": "affected",
"version": "Version 10.6.0.0: 10.6.0.0 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=10.4.1.3",
"status": "affected",
"version": "Version 10.4.0.0: 10.4.1.3 and below",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)"
}
],
"datePublic": "2024-08-06T19:24:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point."
}
],
"value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-06T19:51:17.264Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us\u0026docLocale=en_US"
}
],
"source": {
"advisory": "HPESBNW04678",
"discovery": "EXTERNAL"
},
"title": "Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the Soft AP Daemon Service Accessed by the PAPI Protocol",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2024-42400",
"datePublished": "2024-08-06T19:51:17.264Z",
"dateReserved": "2024-07-31T20:37:28.338Z",
"dateUpdated": "2025-03-13T17:20:31.058Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-42399 (GCVE-0-2024-42399)
Vulnerability from cvelistv5 – Published: 2024-08-06 19:48 – Updated: 2025-03-13 13:37
VLAI?
Summary
Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.
Severity ?
5.3 (Medium)
CWE
- CWE-400 - Uncontrolled Resource Consumption
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise | HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10 |
Affected:
Version 8.12.0.0: 8.12.0.1 and below , ≤ <=8.12.0.1
(semver)
Affected: Version 8.10.0.0: 8.10.0.12 and below , ≤ <=8.10.0.12 (semver) Affected: Version 10.6.0.0: 10.6.0.0 and below , ≤ <=10.6.0.0 (semver) Affected: Version 10.4.0.0: 10.4.1.3 and below , ≤ <=10.4.1.3 (semver) |
Credits
zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.6.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.6.0.1",
"status": "affected",
"version": "10.6.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.4.1.2",
"status": "affected",
"version": "10.4.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.12.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.12.0.2",
"status": "affected",
"version": "8.12.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.10.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.10.0.13",
"status": "affected",
"version": "8.10.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.5.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.6.0.0",
"status": "affected",
"version": "10.5.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.3.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.4.0.0",
"status": "affected",
"version": "10.3.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.11.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.12.0.0",
"status": "affected",
"version": "8.11.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.7.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.10.0.0",
"status": "affected",
"version": "8.7.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.6.0.0",
"status": "affected",
"version": "8.4.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:6.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "6.6.0.0",
"status": "affected",
"version": "6.4.0.0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-42399",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-06T20:27:21.784664Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400 Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T13:37:13.997Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10",
"vendor": "Hewlett Packard Enterprise",
"versions": [
{
"lessThanOrEqual": "\u003c=8.12.0.1",
"status": "affected",
"version": "Version 8.12.0.0: 8.12.0.1 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=8.10.0.12",
"status": "affected",
"version": "Version 8.10.0.0: 8.10.0.12 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=10.6.0.0",
"status": "affected",
"version": "Version 10.6.0.0: 10.6.0.0 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=10.4.1.3",
"status": "affected",
"version": "Version 10.4.0.0: 10.4.1.3 and below",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)"
}
],
"datePublic": "2024-08-06T19:24:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point."
}
],
"value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-06T19:48:07.255Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us\u0026docLocale=en_US"
}
],
"source": {
"advisory": "HPESBNW04678",
"discovery": "EXTERNAL"
},
"title": "Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the Soft AP Daemon Service Accessed by the PAPI Protocol",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2024-42399",
"datePublished": "2024-08-06T19:48:07.255Z",
"dateReserved": "2024-07-31T20:37:28.338Z",
"dateUpdated": "2025-03-13T13:37:13.997Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-42398 (GCVE-0-2024-42398)
Vulnerability from cvelistv5 – Published: 2024-08-06 19:37 – Updated: 2025-03-24 21:04
VLAI?
Summary
Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.
Severity ?
5.3 (Medium)
CWE
- CWE-400 - Uncontrolled Resource Consumption
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise | HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10 |
Affected:
Version 8.12.0.0: 8.12.0.1 and below , ≤ <=8.12.0.1
(semver)
Affected: Version 8.10.0.0: 8.10.0.12 and below , ≤ <=8.10.0.12 (semver) Affected: Version 10.6.0.0: 10.6.0.0 and below , ≤ <=10.6.0.0 (semver) Affected: Version 10.4.0.0: 10.4.1.3 and below , ≤ <=10.4.1.3 (semver) |
Credits
zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.6.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.6.0.1",
"status": "affected",
"version": "10.6.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.4.1.2",
"status": "affected",
"version": "10.4.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.12.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.12.0.2",
"status": "affected",
"version": "8.12.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.10.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.10.0.13",
"status": "affected",
"version": "8.10.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.5.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.6.0.0",
"status": "affected",
"version": "10.5.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.3.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unaffected",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.4.0.0",
"status": "affected",
"version": "10.3.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.11.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.12.0.0",
"status": "affected",
"version": "8.11.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.7.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.10.0.0",
"status": "affected",
"version": "8.7.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.6.0.0",
"status": "affected",
"version": "8.4.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:6.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "6.6.0.0",
"status": "affected",
"version": "6.4.0.0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-42398",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-06T19:49:16.243921Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400 Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-24T21:04:59.030Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10",
"vendor": "Hewlett Packard Enterprise",
"versions": [
{
"lessThanOrEqual": "\u003c=8.12.0.1",
"status": "affected",
"version": "Version 8.12.0.0: 8.12.0.1 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=8.10.0.12",
"status": "affected",
"version": "Version 8.10.0.0: 8.10.0.12 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=10.6.0.0",
"status": "affected",
"version": "Version 10.6.0.0: 10.6.0.0 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=10.4.1.3",
"status": "affected",
"version": "Version 10.4.0.0: 10.4.1.3 and below",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "finder",
"value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)"
}
],
"datePublic": "2024-08-06T19:24:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point."
}
],
"value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the Soft AP daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-06T19:38:53.191Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us\u0026docLocale=en_US"
}
],
"source": {
"advisory": "HPESBNW04678",
"discovery": "EXTERNAL"
},
"title": "Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the Soft AP Daemon Service Accessed by the PAPI Protocol",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2024-42398",
"datePublished": "2024-08-06T19:37:12.816Z",
"dateReserved": "2024-07-31T20:37:28.338Z",
"dateUpdated": "2025-03-24T21:04:59.030Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-42393 (GCVE-0-2024-42393)
Vulnerability from cvelistv5 – Published: 2024-08-06 18:58 – Updated: 2024-08-12 16:00
VLAI?
Summary
There are vulnerabilities in the Soft AP Daemon Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise.
Severity ?
9.8 (Critical)
CWE
- CWE-94 - Improper Control of Generation of Code ('Code Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | Hpe Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10 |
Affected:
Version 8.12.0.0: 8.12.0.1 and below , ≤ <=8.12.0.1
(semver)
Affected: Version 8.10.0.0: 8.10.0.12 and below , ≤ <=8.10.0.12 (semver) |
Credits
zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThanOrEqual": "8.10.0.12",
"status": "affected",
"version": "8.10.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.12.0.1",
"status": "affected",
"version": "8.12.0.0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-42393",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-06T19:13:40.644282Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-94",
"description": "CWE-94 Improper Control of Generation of Code (\u0027Code Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-12T16:00:36.388Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "Hpe Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=8.12.0.1",
"status": "affected",
"version": "Version 8.12.0.0: 8.12.0.1 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=8.10.0.12",
"status": "affected",
"version": "Version 8.10.0.0: 8.10.0.12 and below",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)"
}
],
"datePublic": "2024-08-06T19:18:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eThere are vulnerabilities in the Soft AP Daemon Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise.\u003c/p\u003e"
}
],
"value": "There are vulnerabilities in the Soft AP Daemon Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-06T19:44:56.016Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us\u0026docLocale=en_US"
}
],
"source": {
"advisory": "HPESBNW04678",
"discovery": "EXTERNAL"
},
"title": "Unauthenticated Stack-Based Buffer Overflow Remote Command Execution (RCE) in the Soft AP Daemon Service Accessed by the PAPI Protocol",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2024-42393",
"datePublished": "2024-08-06T18:58:52.509Z",
"dateReserved": "2024-07-31T20:37:28.337Z",
"dateUpdated": "2024-08-12T16:00:36.388Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-42394 (GCVE-0-2024-42394)
Vulnerability from cvelistv5 – Published: 2024-08-06 18:57 – Updated: 2024-08-07 14:27
VLAI?
Summary
There are vulnerabilities in the Soft AP Daemon Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise.
Severity ?
9.8 (Critical)
CWE
- CWE-200 - Exposure of Sensitive Information to an Unauthorized Actor
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10 |
Affected:
Version 8.12.0.0: 8.12.0.1 and below , ≤ <=8.12.0.1
(semver)
Affected: Version 8.10.0.0: 8.10.0.12 and below , ≤ <=8.10.0.12 (semver) |
Credits
zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:hpe:aruba_networking_instantos:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "aruba_networking_instantos",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "8.12.0.1",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.10.0.12",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:hpe:arubaos:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "arubaos",
"vendor": "hpe",
"versions": [
{
"lessThanOrEqual": "8.12.0.1",
"status": "affected",
"version": "0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.10.0.12",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-42394",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-07T13:58:43.755424Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-200",
"description": "CWE-200 Exposure of Sensitive Information to an Unauthorized Actor",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-07T14:27:21.760Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=8.12.0.1",
"status": "affected",
"version": "Version 8.12.0.0: 8.12.0.1 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=8.10.0.12",
"status": "affected",
"version": "Version 8.10.0.0: 8.10.0.12 and below",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)"
}
],
"datePublic": "2024-08-06T19:17:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eThere are vulnerabilities in the Soft AP Daemon Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise.\u003c/p\u003e"
}
],
"value": "There are vulnerabilities in the Soft AP Daemon Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-06T19:43:44.092Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us\u0026docLocale=en_US"
}
],
"source": {
"advisory": "HPESBNW04678",
"discovery": "EXTERNAL"
},
"title": "Unauthenticated Stack-Based Buffer Overflow Remote Command Execution (RCE) in the Soft AP Daemon Service Accessed by the PAPI Protocol",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2024-42394",
"datePublished": "2024-08-06T18:57:23.377Z",
"dateReserved": "2024-07-31T20:37:28.338Z",
"dateUpdated": "2024-08-07T14:27:21.760Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-42395 (GCVE-0-2024-42395)
Vulnerability from cvelistv5 – Published: 2024-08-06 18:56 – Updated: 2024-08-08 14:47
VLAI?
Summary
There is a vulnerability in the AP Certificate Management Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise.
Severity ?
9.8 (Critical)
CWE
- CWE-295 - Improper Certificate Validation
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10 |
Affected:
Version 8.12.0.0: 8.12.0.1 and below , ≤ <=8.12.0.1
(semver)
Affected: Version 8.10.0.0: 8.10.0.12 and below , ≤ <=8.10.0.12 (semver) |
Credits
zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.12.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.12.0.2",
"status": "affected",
"version": "8.12.0.0",
"versionType": "semver"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.10.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.10.0.13",
"status": "affected",
"version": "8.10.0.0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-42395",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-07T14:51:10.591351Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-295",
"description": "CWE-295 Improper Certificate Validation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-08T14:47:07.721Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=8.12.0.1",
"status": "affected",
"version": "Version 8.12.0.0: 8.12.0.1 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=8.10.0.12",
"status": "affected",
"version": "Version 8.10.0.0: 8.10.0.12 and below",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)"
}
],
"datePublic": "2024-08-06T19:16:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eThere is a vulnerability in the AP Certificate Management Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise.\u003c/p\u003e"
}
],
"value": "There is a vulnerability in the AP Certificate Management Service which could allow a threat actor to execute an unauthenticated RCE attack. Successful exploitation could allow an attacker to execute arbitrary commands on the underlying operating system leading to complete system compromise."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-06T19:42:44.319Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us\u0026docLocale=en_US"
}
],
"source": {
"advisory": "HPESBNW04678",
"discovery": "EXTERNAL"
},
"title": "Unauthenticated Stack-Based Buffer Overflow Remote Command Execution (RCE) in the AP Certificate Management Service Accessed by the PAPI Protocol",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2024-42395",
"datePublished": "2024-08-06T18:56:05.348Z",
"dateReserved": "2024-07-31T20:37:28.338Z",
"dateUpdated": "2024-08-08T14:47:07.721Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-42396 (GCVE-0-2024-42396)
Vulnerability from cvelistv5 – Published: 2024-08-06 18:54 – Updated: 2025-03-25 16:46
VLAI?
Summary
Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Certificate Management daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.
Severity ?
5.3 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10 |
Affected:
Version 8.12.0.0: 8.12.0.1 and below , ≤ <=8.12.0.1
(semver)
Affected: Version 8.10.0.0: 8.10.0.12 and below , ≤ <=8.10.0.12 (semver) |
Credits
zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:*:*:*:*:*:*:*:*"
],
"defaultStatus": "affected",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThanOrEqual": "8.10.0.12",
"status": "affected",
"version": "8.10.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.12.0.1",
"status": "affected",
"version": "8.12.0.0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-42396",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-06T20:05:29.572011Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-25T16:46:21.354Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=8.12.0.1",
"status": "affected",
"version": "Version 8.12.0.0: 8.12.0.1 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=8.10.0.12",
"status": "affected",
"version": "Version 8.10.0.0: 8.10.0.12 and below",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)"
}
],
"datePublic": "2024-08-06T19:16:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMultiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Certificate Management daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.\u003c/p\u003e"
}
],
"value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Certificate Management daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-06T19:41:51.479Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us\u0026docLocale=en_US"
}
],
"source": {
"advisory": "HPESBNW04678",
"discovery": "EXTERNAL"
},
"title": "Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the AP Certificate Management Service Accessed by the PAPI Protocol",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2024-42396",
"datePublished": "2024-08-06T18:54:42.859Z",
"dateReserved": "2024-07-31T20:37:28.338Z",
"dateUpdated": "2025-03-25T16:46:21.354Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-42397 (GCVE-0-2024-42397)
Vulnerability from cvelistv5 – Published: 2024-08-06 18:51 – Updated: 2025-03-19 16:03
VLAI?
Summary
Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Certificate Management daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.
Severity ?
5.3 (Medium)
CWE
- CWE-400 - Uncontrolled Resource Consumption
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10 |
Affected:
Version 8.12.0.0: 8.12.0.1 and below , ≤ <=8.12.0.1
(semver)
Affected: Version 8.10.0.0: 8.10.0.12 and below , ≤ <=8.10.0.12 (semver) |
Credits
zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-42397",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-06T19:22:06.175963Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-400",
"description": "CWE-400 Uncontrolled Resource Consumption",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-19T16:03:44.141Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "affected",
"product": "HPE Aruba Networking InstantOS and Aruba Access Points running ArubaOS 10",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "\u003c=8.12.0.1",
"status": "affected",
"version": "Version 8.12.0.0: 8.12.0.1 and below",
"versionType": "semver"
},
{
"lessThanOrEqual": "\u003c=8.10.0.12",
"status": "affected",
"version": "Version 8.10.0.0: 8.10.0.12 and below",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"value": "zzcentury from Ubisectech Sirius Team (https://www.ubisectech.com/)"
}
],
"datePublic": "2024-08-06T19:15:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eMultiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Certificate Management daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point.\u003c/p\u003e"
}
],
"value": "Multiple unauthenticated Denial-of-Service (DoS) vulnerabilities exist in the AP Certificate Management daemon accessed via the PAPI protocol. Successful exploitation of these vulnerabilities results in the ability to interrupt the normal operation of the affected Access Point."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-08-06T19:40:20.342Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04678en_us\u0026docLocale=en_US"
}
],
"source": {
"advisory": "HPESBNW04678",
"discovery": "EXTERNAL"
},
"title": "Unauthenticated Denial-of-Service (DoS) Vulnerabilities in the AP Certificate Management Service Accessed by the PAPI Protocol",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2024-42397",
"datePublished": "2024-08-06T18:51:57.643Z",
"dateReserved": "2024-07-31T20:37:28.338Z",
"dateUpdated": "2025-03-19T16:03:44.141Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-41911 (GCVE-0-2024-41911)
Vulnerability from cvelistv5 – Published: 2024-08-06 14:07 – Updated: 2024-10-28 20:23
VLAI?
Summary
A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The flaw does not properly neutralize input during a web page generation.
Severity ?
5.4 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-41911",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-08-06T15:52:22.228928Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-28T20:23:13.420Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The flaw does not properly neutralize input during a web page generation."
}
],
"providerMetadata": {
"dateUpdated": "2024-08-06T14:07:33.637Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_11006770-11006795-16/hpsbpy03959"
}
],
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2024-41911",
"datePublished": "2024-08-06T14:07:33.637Z",
"dateReserved": "2024-07-23T15:33:15.305Z",
"dateUpdated": "2024-10-28T20:23:13.420Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-41910 (GCVE-0-2024-41910)
Vulnerability from cvelistv5 – Published: 2024-08-06 14:05 – Updated: 2025-03-14 16:06
VLAI?
Summary
A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware contained multiple XSS vulnerabilities in the version of JavaScript used.
Severity ?
6.1 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-41910",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-03T14:36:11.018010Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-14T16:06:19.571Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware contained multiple XSS vulnerabilities in the version of JavaScript used."
}
],
"providerMetadata": {
"dateUpdated": "2024-08-08T17:27:55.381Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_11006981-11007005-16/hpsbpy03960"
}
],
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2024-41910",
"datePublished": "2024-08-06T14:05:28.473Z",
"dateReserved": "2024-07-23T15:33:15.305Z",
"dateUpdated": "2025-03-14T16:06:19.571Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-41913 (GCVE-0-2024-41913)
Vulnerability from cvelistv5 – Published: 2024-08-06 13:57 – Updated: 2025-03-19 15:21
VLAI?
Summary
A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware flaw does not properly sanitize User input.
Severity ?
8.8 (High)
CWE
- CWE-434 - Unrestricted Upload of File with Dangerous Type
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| HP Inc. | Poly Clariti Manager |
Affected:
See HP Security Bulletin reference for affected versions.
|
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-41913",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-03-19T15:20:42.654177Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-434",
"description": "CWE-434 Unrestricted Upload of File with Dangerous Type",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-19T15:21:17.519Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Poly Clariti Manager",
"vendor": "HP Inc.",
"versions": [
{
"status": "affected",
"version": "See HP Security Bulletin reference for affected versions."
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was discovered in the firmware builds up to 10.10.2.2 in Poly Clariti Manager devices. The firmware flaw does not properly sanitize User input."
}
],
"providerMetadata": {
"dateUpdated": "2024-08-06T13:57:29.551Z",
"orgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"shortName": "hp"
},
"references": [
{
"url": "https://support.hp.com/us-en/document/ish_11006488-11006512-16/hpsbpy03957"
}
],
"title": "Clariti Manager \u2013 Arbitrary File Upload",
"x_generator": {
"engine": "cveClient/1.0.15"
}
}
},
"cveMetadata": {
"assignerOrgId": "74586083-13ce-40fd-b46a-8e5d23cfbcb2",
"assignerShortName": "hp",
"cveId": "CVE-2024-41913",
"datePublished": "2024-08-06T13:57:29.551Z",
"dateReserved": "2024-07-23T15:33:15.305Z",
"dateUpdated": "2025-03-19T15:21:17.519Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-6147 (GCVE-0-2024-6147)
Vulnerability from cvelistv5 – Published: 2024-06-20 20:11 – Updated: 2024-08-01 21:33
VLAI?
Summary
Poly Plantronics Hub Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Poly Plantronics Hub. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the Spokes Update Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18271.
Severity ?
7.8 (High)
CWE
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Poly | Plantronics Hub |
Affected:
3.24.2 Build 36336
|
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:plantronics:plantronics_hub:*:*:*:*:*:windows:*:*"
],
"defaultStatus": "unknown",
"product": "plantronics_hub",
"vendor": "plantronics",
"versions": [
{
"status": "affected",
"version": "3.24.2 Build 36336"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-6147",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-06-25T19:21:00.721267Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-26T19:40:03.741Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T21:33:04.947Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "ZDI-24-802",
"tags": [
"x_research-advisory",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-802/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unknown",
"product": "Plantronics Hub",
"vendor": "Poly",
"versions": [
{
"status": "affected",
"version": "3.24.2 Build 36336"
}
]
}
],
"dateAssigned": "2024-06-18T16:11:49.104-05:00",
"datePublic": "2024-06-18T18:32:18.515-05:00",
"descriptions": [
{
"lang": "en",
"value": "Poly Plantronics Hub Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Poly Plantronics Hub. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Spokes Update Service. By creating a symbolic link, an attacker can abuse the service to delete a file. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-18271."
}
],
"metrics": [
{
"cvssV3_0": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-59",
"description": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-20T20:11:52.626Z",
"orgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"shortName": "zdi"
},
"references": [
{
"name": "ZDI-24-802",
"tags": [
"x_research-advisory"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-24-802/"
}
],
"source": {
"lang": "en",
"value": "Michael DePlante (@izobashi) of Trend Micro\u0027s Zero Day Initiative"
},
"title": "Poly Plantronics Hub Link Following Local Privilege Escalation Vulnerability"
}
},
"cveMetadata": {
"assignerOrgId": "99f1926a-a320-47d8-bbb5-42feb611262e",
"assignerShortName": "zdi",
"cveId": "CVE-2024-6147",
"datePublished": "2024-06-20T20:11:52.626Z",
"dateReserved": "2024-06-18T21:11:49.077Z",
"dateUpdated": "2024-08-01T21:33:04.947Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-31483 (GCVE-0-2024-31483)
Vulnerability from cvelistv5 – Published: 2024-05-14 22:37 – Updated: 2025-06-24 15:23
VLAI?
Summary
An authenticated sensitive information disclosure vulnerability exists in the CLI service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to read arbitrary files in the underlying operating system.
Severity ?
4.9 (Medium)
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | AOS-8 Instant and AOS-10 AP |
Affected:
10.5.0.0 , ≤ 10.5.1.0
(semver)
Affected: 10.4.0.0 , ≤ 10.4.1.0 (semver) Affected: 8.11.0.0 , ≤ 8.11.2.1 (semver) Affected: 8.10.0.0 , ≤ 8.10.0.10 (semver) Affected: 8.6.0.0 , ≤ 8.6.0.23 (semver) |
Credits
Chancen
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.5.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThanOrEqual": "10.5.1.0",
"status": "affected",
"version": "10.5.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThanOrEqual": "10.4.1.0",
"status": "affected",
"version": "10.4.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.10.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThanOrEqual": "8.10.0.10",
"status": "affected",
"version": "8.10.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.11.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThanOrEqual": "8.11.2.1",
"status": "affected",
"version": "8.11.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.6.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThanOrEqual": "8.6.0.23",
"status": "affected",
"version": "8.6.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.3.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.4.0.0",
"status": "affected",
"version": "10.3.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.9.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.10.0.0",
"status": "affected",
"version": "8.9.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.8.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.9.0.0",
"status": "affected",
"version": "8.8.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.5.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.6.0.0",
"status": "affected",
"version": "8.5.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.7.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.8.0.0",
"status": "affected",
"version": "8.7.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.5.0.0",
"status": "affected",
"version": "8.4.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:6.5.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "6.6.0.0",
"status": "affected",
"version": "6.5.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:6.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "6.5.0.0",
"status": "affected",
"version": "6.4.0.0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-31483",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-15T13:43:52.164471Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-noinfo Not enough information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-10-31T15:12:51.026Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T01:52:57.245Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "AOS-8 Instant and AOS-10 AP",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "10.5.1.0",
"status": "affected",
"version": "10.5.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "10.4.1.0",
"status": "affected",
"version": "10.4.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.11.2.1",
"status": "affected",
"version": "8.11.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.10.0.10",
"status": "affected",
"version": "8.10.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.6.0.23",
"status": "affected",
"version": "8.6.0.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Chancen"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eAn authenticated sensitive information disclosure vulnerability exists in the CLI service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to read arbitrary files in the underlying operating system.\u003c/p\u003e"
}
],
"value": "An authenticated sensitive information disclosure vulnerability exists in the CLI service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to read arbitrary files in the underlying operating system."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-24T15:23:49.047Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04647en_us\u0026docLocale=en_US"
}
],
"source": {
"advisory": "HPESBNW04647",
"discovery": "INTERNAL"
},
"x_generator": {
"engine": "Vulnogram 0.1.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2024-31483",
"datePublished": "2024-05-14T22:37:06.652Z",
"dateReserved": "2024-04-03T21:21:22.898Z",
"dateUpdated": "2025-06-24T15:23:49.047Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2024-31482 (GCVE-0-2024-31482)
Vulnerability from cvelistv5 – Published: 2024-05-14 22:36 – Updated: 2025-06-24 15:22
VLAI?
Summary
An unauthenticated Denial-of-Service (DoS) vulnerability exists in the ANSI escape code service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected Access Point.
Severity ?
5.3 (Medium)
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Hewlett Packard Enterprise (HPE) | AOS-8 Instant and AOS-10 AP |
Affected:
10.5.0.0 , ≤ 10.5.1.0
(semver)
Affected: 10.4.0.0 , ≤ 10.4.1.0 (semver) Affected: 8.11.0.0 , ≤ 8.11.2.1 (semver) Affected: 8.10.0.0 , ≤ 8.10.0.10 (semver) Affected: 8.6.0.0 , ≤ 8.6.0.23 (semver) |
Credits
Chancen
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.5.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThanOrEqual": "10.5.1.0",
"status": "affected",
"version": "10.5.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThanOrEqual": "10.4.1.0",
"status": "affected",
"version": "10.4.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.10.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThanOrEqual": "8.10.0.10",
"status": "affected",
"version": "8.10.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.11.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThanOrEqual": "8.11.2.1",
"status": "affected",
"version": "8.11.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.6.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThanOrEqual": "8.6.0.23",
"status": "affected",
"version": "8.6.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:arubaos:10.3.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "arubaos",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "10.4.0.0",
"status": "affected",
"version": "10.3.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.9.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.10.0.0",
"status": "affected",
"version": "8.9.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.8.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.9.0.0",
"status": "affected",
"version": "8.8.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.5.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.6.0.0",
"status": "affected",
"version": "8.5.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.7.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.8.0.0",
"status": "affected",
"version": "8.7.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:8.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "8.5.0.0",
"status": "affected",
"version": "8.4.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:6.5.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "6.6.0.0",
"status": "affected",
"version": "6.5.0.0",
"versionType": "custom"
}
]
},
{
"cpes": [
"cpe:2.3:o:arubanetworks:instant:6.4.0.0:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "instant",
"vendor": "arubanetworks",
"versions": [
{
"lessThan": "6.5.0.0",
"status": "affected",
"version": "6.4.0.0",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-31482",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-15T13:43:20.652798Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-78",
"description": "CWE-78 Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-06T17:01:42.878Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-02T01:52:57.280Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2024-006.txt"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "AOS-8 Instant and AOS-10 AP",
"vendor": "Hewlett Packard Enterprise (HPE)",
"versions": [
{
"lessThanOrEqual": "10.5.1.0",
"status": "affected",
"version": "10.5.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "10.4.1.0",
"status": "affected",
"version": "10.4.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.11.2.1",
"status": "affected",
"version": "8.11.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.10.0.10",
"status": "affected",
"version": "8.10.0.0",
"versionType": "semver"
},
{
"lessThanOrEqual": "8.6.0.23",
"status": "affected",
"version": "8.6.0.0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"type": "reporter",
"user": "00000000-0000-4000-9000-000000000000",
"value": "Chancen"
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cp\u003eAn unauthenticated Denial-of-Service (DoS) vulnerability exists in the ANSI escape code service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected Access Point.\u003c/p\u003e"
}
],
"value": "An unauthenticated Denial-of-Service (DoS) vulnerability exists in the ANSI escape code service accessed via the PAPI protocol. Successful exploitation of this vulnerability results in the ability to interrupt the normal operation of the affected Access Point."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-06-24T15:22:57.371Z",
"orgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"shortName": "hpe"
},
"references": [
{
"url": "https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04647en_us\u0026docLocale=en_US"
}
],
"source": {
"advisory": "HPESBNW04647",
"discovery": "INTERNAL"
},
"x_generator": {
"engine": "Vulnogram 0.1.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "eb103674-0d28-4225-80f8-39fb86215de0",
"assignerShortName": "hpe",
"cveId": "CVE-2024-31482",
"datePublished": "2024-05-14T22:36:10.770Z",
"dateReserved": "2024-04-03T21:21:22.898Z",
"dateUpdated": "2025-06-24T15:22:57.371Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}