cve-2022-29277
Vulnerability from cvelistv5
Published
2022-11-15 00:00
Modified
2024-08-03 06:17
Severity ?
EPSS score ?
Summary
Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://www.insyde.com/security-pledge | Vendor Advisory | |
cve@mitre.org | https://www.insyde.com/security-pledge/SA-2022060 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.insyde.com/security-pledge/SA-2022060 | Vendor Advisory |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T06:17:54.724Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://www.insyde.com/security-pledge" }, { "tags": [ "x_transferred" ], "url": "https://www.insyde.com/security-pledge/SA-2022060" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-15T00:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "url": "https://www.insyde.com/security-pledge" }, { "url": "https://www.insyde.com/security-pledge/SA-2022060" } ], "source": { "discovery": "INTERNAL" } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2022-29277", "datePublished": "2022-11-15T00:00:00", "dateReserved": "2022-04-15T00:00:00", "dateUpdated": "2024-08-03T06:17:54.724Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:genoa_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.52.25.0006\", \"matchCriteriaId\": \"FCC60EFA-7174-4E91-A33F-794935B12334\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:genoa:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90592BBD-A547-41D5-9696-D93392467417\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:hygon_1_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.36.26.0016\", \"matchCriteriaId\": \"05922CE9-07BA-43C8-9B7E-344F9AACEC8E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:hygon_1:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B1E855A2-4673-41C3-8966-8BE1225B4117\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:hygon_2_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.36.26.0016\", \"matchCriteriaId\": \"B9BFD1DF-1C4A-44D6-8E34-AA357AD99C0C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:hygon_2:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED45EDED-9C4E-4D94-9101-AC52AAC3DA88\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:hygon_3_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.44.26.0007\", \"matchCriteriaId\": \"A4879580-095C-4503-8D81-5CCE09B6CEB4\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:hygon_3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B569C92C-0C16-4F5E-92F4-CF6502131A3A\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:milan_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.36.10.0017\", \"matchCriteriaId\": \"B638FCDF-0ADD-4815-BD0A-3157D212A130\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:milan:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89C2BBB6-469A-48A4-85EB-A6BBD21AA27F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:milan_firmware:*:*:*:*:embedded:*:*:*\", \"versionEndExcluding\": \"05.36.26.0016\", \"matchCriteriaId\": \"29F98F52-0086-4F25-8CBB-909DD79A2D71\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:milan:-:*:*:*:embedded:*:*:*\", \"matchCriteriaId\": \"59B0388D-7B0E-439F-896B-A4E08F657606\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:rome_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.36.10.0017\", \"matchCriteriaId\": \"E55655FF-21B7-4602-9C4D-3CC0320CEF99\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:rome:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39415311-BEFC-4507-8964-75C393381633\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:rome_firmware:*:*:*:*:embedded:*:*:*\", \"versionEndExcluding\": \"05.36.26.0016\", \"matchCriteriaId\": \"2F29A768-8EF1-4F50-A78D-56BC9BE41484\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:rome:-:*:*:*:embedded:*:*:*\", \"matchCriteriaId\": \"95D58B14-392D-4F65-8FF0-199867D3D2BB\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5300g_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.44.30.0004\", \"matchCriteriaId\": \"96C827CD-61BA-4FA8-886C-08815FA83D4A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D857EFE-B24E-4228-BB1E-34F9BC763A11\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5300ge_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.44.30.0004\", \"matchCriteriaId\": \"C252F160-6CBE-42EC-A6AC-82F932348A55\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F6CC472B-1502-402D-B2AC-8A63A69F2A27\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5600g_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.44.30.0004\", \"matchCriteriaId\": \"73443456-6425-46B1-A602-A326B410FE7A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8937FABB-B60E-4780-BB6D-B1B99DD69219\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5600ge_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.44.30.0004\", \"matchCriteriaId\": \"4D29447B-3FF9-4B29-AA00-5179E54A2991\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B83F1F6-64B1-40D3-817A-E27CEB2E93EC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5600x_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.44.30.0004\", \"matchCriteriaId\": \"07E151CD-DED7-4900-8346-7CC60447A3D5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A6CE435D-B9E9-43D6-AFBC-74E258DC4DFA\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5700g_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.44.30.0004\", \"matchCriteriaId\": \"C14D153C-8CC3-40B2-B694-08C4FBB67A8C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20F5FCF8-FDDA-43F6-AFFD-1874DB2BB806\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5700ge_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.44.30.0004\", \"matchCriteriaId\": \"47E4A102-1306-481F-96D5-3F677FE54152\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA1A9BEC-27AB-40AD-BBED-4420451D3793\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5800x_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.44.30.0004\", \"matchCriteriaId\": \"D1FF208E-2271-440D-9398-2807CBF87233\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"48F6B331-4C0F-49FF-A39F-381B9ADE3483\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5800x3d_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.44.30.0004\", \"matchCriteriaId\": \"CA8CD6DB-42C5-4584-8E22-090614949DF3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"238EA54F-4809-4D8F-9F18-71135FED9D05\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5900x_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.44.30.0004\", \"matchCriteriaId\": \"7872EB6C-5C3D-4804-9934-53BD91A0B88E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"050C802C-D8C7-4D58-BA6E-AC48EEF25215\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:ryzen_5950x_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.44.30.0004\", \"matchCriteriaId\": \"48018BD4-08DF-4D87-A6AD-251236FD673E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD9478CC-DF88-4833-BBB2-2D82D9BBFA63\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:snowy_owl_r1000_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.32.50.0018\", \"matchCriteriaId\": \"5E840A2C-A5BA-4054-A932-07B1AED61C3E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:snowy_owl_r1000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7AA109B5-E052-4944-AA5C-96B6E8842902\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:snowy_owl_r2000_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.44.30.0005\", \"matchCriteriaId\": \"2CFD31CB-623F-46E9-B181-AC5D96349A47\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:snowy_owl_r2000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1963FD6B-57F6-4CDC-A92B-20079526ACB0\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:snowy_owl_v2000_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.44.30.0007\", \"matchCriteriaId\": \"4A998C25-E37C-4987-AFBE-91AA6F324A0E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:snowy_owl_v2000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5EACEBA7-F35C-4FCD-B146-4E1A274B8E3B\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:amd:snowy_owl_v3000_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.44.30.0007\", \"matchCriteriaId\": \"669E1226-DA98-4A6B-BF79-602258AAFC80\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:amd:snowy_owl_v3000:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61FA4046-4CD6-4592-B972-1C2ADD4978D1\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:alder_lake_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.44.23.0047\", \"matchCriteriaId\": \"5A94F47D-AC22-44FF-A9F9-B3709D5A0897\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:alder_lake:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E39D7884-8579-4B0C-BC50-66DFE48583A5\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:bakerville_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.21.51.0026\", \"matchCriteriaId\": \"9238729D-BE76-4DDE-B3BC-04AA0E96EDF7\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:bakerville:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DBB308D-E36F-4ECD-8DFF-3784FCECDBEC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:cedar_island_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.42.11.0021\", \"matchCriteriaId\": \"C9165049-02FB-436E-84CD-0F1C9376CF5D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:cedar_island:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3EEA11CC-5BB3-41FF-AAC5-2A74C3E862F2\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:idaville_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.43.12.0052\", \"matchCriteriaId\": \"01F0F8C2-28B8-4670-A47F-999B98A2F6CB\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:idaville:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"25C6C611-A06F-4855-B224-C05CD6EBA88F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:comet_lake-s_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.43.12.0052\", \"matchCriteriaId\": \"CB35619B-30AB-4F2F-BBE9-B382AB2A20A2\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:comet_lake-s:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"20A2F526-3B6E-433A-9CCC-471686292193\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:tiger_lake_h\\\\/up3_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.43.12.0052\", \"matchCriteriaId\": \"5984089E-3004-476E-A0EA-8B745EDB5D8C\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:tiger_lake_h\\\\/up3:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D856B7FC-16F1-490E-AB0C-14FFB14718A7\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:whiskey_lake_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.43.12.0052\", \"matchCriteriaId\": \"489E0210-427F-4D52-B184-B908EC13325F\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:whiskey_lake:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66A81E2D-E1A6-4B0F-B7F3-C76927598E1C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:denverton_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.10.12.0042\", \"matchCriteriaId\": \"E1978C90-172F-49AE-8F2C-C5FEDAFF9F30\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:denverton:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A70CCE3F-ED5E-4186-84C7-69B58839E386\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:eagle_stream_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.44.25.0052\", \"matchCriteriaId\": \"B2FB3A30-921A-45AF-AE16-9C3BCECB1125\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:eagle_stream:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F85CBD5-5CE0-4A52-8996-4674CF17D5CC\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:grangeville_de_ns_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.27.26.0023\", \"matchCriteriaId\": \"C665AF80-C500-4A94-BD6C-8A4ECB8FB64E\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:grangeville_de_ns:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64D791A1-0735-4C4C-A0BB-D2D96790C3F9\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:granville_de_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.05.15.0038\", \"matchCriteriaId\": \"EF2F487C-0A2C-4828-88D1-04C5C98AD56A\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:granville_de:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4270D4E-9FC2-475B-93BD-A5CB6D565B28\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:greenlow_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.10.12.0042\", \"matchCriteriaId\": \"17DFAFE0-1E3E-408C-9FD6-7174C07CF909\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:greenlow:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"44431D1A-D10F-414D-A400-0C5C4F06F99C\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:greenlow-r_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.10.12.0042\", \"matchCriteriaId\": \"C5B3B4F7-A7D4-4BC1-9A18-B71298FF4C52\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:greenlow-r:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"401E968C-3B59-4200-953F-0050DBA90E46\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:mehlow_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.10.12.0042\", \"matchCriteriaId\": \"7B7BD8DE-932E-4EA7-A010-E1B18AA8E982\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:mehlow:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9DBE1F12-551F-4AEF-81A1-E6A588C1C45F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:mehlow-r_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.10.12.0042\", \"matchCriteriaId\": \"41AFCB8E-A4D9-4A0C-9088-57BA643E05A5\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:mehlow-r:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C701B92D-AF94-459B-BC6A-612111555231\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:tatlow_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.10.12.0042\", \"matchCriteriaId\": \"97883F64-02E6-46C8-A70B-A01E120A0FF3\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:tatlow:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84719A8D-75B1-42F7-A568-F7FD501F8B1F\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:purley-r_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.21.51.0048\", \"matchCriteriaId\": \"7EDB05C1-3989-4E5F-A560-0E3A8449124D\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:purley-r:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"43D86D5A-334F-418F-88BE-2A24B06E80A6\"}]}]}, {\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:intel:whitley_firmware:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"05.42.23.0066\", \"matchCriteriaId\": \"354D107D-B11F-4A10-A50B-8C22E5B93C16\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:intel:whitley:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F449054E-C729-485F-B5FA-AA49FF0D0294\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060\"}, {\"lang\": \"es\", \"value\": \"Las comprobaciones incorrectas del puntero dentro del controlador FwBlockServiceSmm pueden permitir modificaciones arbitrarias de la RAM. Durante la revisi\\u00f3n del controlador FwBlockServiceSmm, se podr\\u00eda enga\\u00f1ar a ciertas instancias de SpiAccessLib para que escriban 0xff en direcciones SMRAM y del sistema arbitrarias. Solucionado en: \\nINTEL Purley-R: 05.21.51.0048 \\nWhitley: 05.42.23.0066 \\nCedar Island: 05.42.11.0021 \\nEagle Stream: 05.44.25.0052 \\nGreenlow/Greenlow-R(skylake/kabylake): Trunk \\nMehlow/Mehlow-R (CoffeeLake-S) : Trunk \\nTatlow (RKL-S): Trunk \\nDenverton: 05.10.12.0042 \\nSnow Ridge: Trunk \\nGraneville DE: 05.05.15.0038 \\nGrangeville DE NS: 05.27.26.0023 \\nBakerville: 05.21.51.0026 \\nIdaville: 05.44.27.0030 \\nWhiskey Lake: Trunk \\nComet Lake-S : Trunk \\nTiger Lake H/UP3: 05.43.12.0052 \\nAlder Lake: 05.44.23.0047 \\nGemini Lake: No afectado \\nApollo Lake: No afectado \\nElkhart Lake: 05.44.30.0018 \\nAMD ROMA: Trunk \\nMILAN: 05.36.10.0017 \\nG\\u00c9NOVA: 05.52.25.0006 \\nNival: Trunk \\nR1000: 05.32.50.0018 \\nR2000: 05.44.30.0005 \\nV2000: Trunk \\nV3000: 05.44.30.0007 \\nRyzen 5000: 05.44.30.0004 Embedded \\nROME: Trunk Embedded \\nMILAN: Trunk \\nHygon Hygon #1/#2: 05.36.2 6.0016 \\nHygon #3: 05.44. 26.0007 \\nhttps://www.insyde.com/security-pledge/SA-2022060\"}]", "id": "CVE-2022-29277", "lastModified": "2024-11-21T06:58:51.380", "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\", \"baseScore\": 8.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.0, \"impactScore\": 6.0}]}", "published": "2022-11-15T22:15:10.933", "references": "[{\"url\": \"https://www.insyde.com/security-pledge\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.insyde.com/security-pledge/SA-2022060\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.insyde.com/security-pledge\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.insyde.com/security-pledge/SA-2022060\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]", "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2022-29277\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2022-11-15T22:15:10.933\",\"lastModified\":\"2024-11-21T06:58:51.380\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM addresses. Fixed in: INTEL Purley-R: 05.21.51.0048 Whitley: 05.42.23.0066 Cedar Island: 05.42.11.0021 Eagle Stream: 05.44.25.0052 Greenlow/Greenlow-R(skylake/kabylake): Trunk Mehlow/Mehlow-R (CoffeeLake-S): Trunk Tatlow (RKL-S): Trunk Denverton: 05.10.12.0042 Snow Ridge: Trunk Graneville DE: 05.05.15.0038 Grangeville DE NS: 05.27.26.0023 Bakerville: 05.21.51.0026 Idaville: 05.44.27.0030 Whiskey Lake: Trunk Comet Lake-S: Trunk Tiger Lake H/UP3: 05.43.12.0052 Alder Lake: 05.44.23.0047 Gemini Lake: Not Affected Apollo Lake: Not Affected Elkhart Lake: 05.44.30.0018 AMD ROME: trunk MILAN: 05.36.10.0017 GENOA: 05.52.25.0006 Snowy Owl: Trunk R1000: 05.32.50.0018 R2000: 05.44.30.0005 V2000: Trunk V3000: 05.44.30.0007 Ryzen 5000: 05.44.30.0004 Embedded ROME: Trunk Embedded MILAN: Trunk Hygon Hygon #1/#2: 05.36.26.0016 Hygon #3: 05.44.26.0007 https://www.insyde.com/security-pledge/SA-2022060\"},{\"lang\":\"es\",\"value\":\"Las comprobaciones incorrectas del puntero dentro del controlador FwBlockServiceSmm pueden permitir modificaciones arbitrarias de la RAM. Durante la revisi\u00f3n del controlador FwBlockServiceSmm, se podr\u00eda enga\u00f1ar a ciertas instancias de SpiAccessLib para que escriban 0xff en direcciones SMRAM y del sistema arbitrarias. Solucionado en: \\nINTEL Purley-R: 05.21.51.0048 \\nWhitley: 05.42.23.0066 \\nCedar Island: 05.42.11.0021 \\nEagle Stream: 05.44.25.0052 \\nGreenlow/Greenlow-R(skylake/kabylake): Trunk \\nMehlow/Mehlow-R (CoffeeLake-S) : Trunk \\nTatlow (RKL-S): Trunk \\nDenverton: 05.10.12.0042 \\nSnow Ridge: Trunk \\nGraneville DE: 05.05.15.0038 \\nGrangeville DE NS: 05.27.26.0023 \\nBakerville: 05.21.51.0026 \\nIdaville: 05.44.27.0030 \\nWhiskey Lake: Trunk \\nComet Lake-S : Trunk \\nTiger Lake H/UP3: 05.43.12.0052 \\nAlder Lake: 05.44.23.0047 \\nGemini Lake: No afectado \\nApollo Lake: No afectado \\nElkhart Lake: 05.44.30.0018 \\nAMD ROMA: Trunk \\nMILAN: 05.36.10.0017 \\nG\u00c9NOVA: 05.52.25.0006 \\nNival: Trunk \\nR1000: 05.32.50.0018 \\nR2000: 05.44.30.0005 \\nV2000: Trunk \\nV3000: 05.44.30.0007 \\nRyzen 5000: 05.44.30.0004 Embedded \\nROME: Trunk Embedded \\nMILAN: Trunk \\nHygon Hygon #1/#2: 05.36.2 6.0016 \\nHygon #3: 05.44. 26.0007 \\nhttps://www.insyde.com/security-pledge/SA-2022060\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:genoa_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.52.25.0006\",\"matchCriteriaId\":\"FCC60EFA-7174-4E91-A33F-794935B12334\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:genoa:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90592BBD-A547-41D5-9696-D93392467417\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:hygon_1_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.36.26.0016\",\"matchCriteriaId\":\"05922CE9-07BA-43C8-9B7E-344F9AACEC8E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:hygon_1:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1E855A2-4673-41C3-8966-8BE1225B4117\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:hygon_2_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.36.26.0016\",\"matchCriteriaId\":\"B9BFD1DF-1C4A-44D6-8E34-AA357AD99C0C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:hygon_2:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED45EDED-9C4E-4D94-9101-AC52AAC3DA88\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:hygon_3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.26.0007\",\"matchCriteriaId\":\"A4879580-095C-4503-8D81-5CCE09B6CEB4\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:hygon_3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B569C92C-0C16-4F5E-92F4-CF6502131A3A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:milan_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.36.10.0017\",\"matchCriteriaId\":\"B638FCDF-0ADD-4815-BD0A-3157D212A130\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:milan:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89C2BBB6-469A-48A4-85EB-A6BBD21AA27F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:milan_firmware:*:*:*:*:embedded:*:*:*\",\"versionEndExcluding\":\"05.36.26.0016\",\"matchCriteriaId\":\"29F98F52-0086-4F25-8CBB-909DD79A2D71\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:milan:-:*:*:*:embedded:*:*:*\",\"matchCriteriaId\":\"59B0388D-7B0E-439F-896B-A4E08F657606\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:rome_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.36.10.0017\",\"matchCriteriaId\":\"E55655FF-21B7-4602-9C4D-3CC0320CEF99\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:rome:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39415311-BEFC-4507-8964-75C393381633\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:rome_firmware:*:*:*:*:embedded:*:*:*\",\"versionEndExcluding\":\"05.36.26.0016\",\"matchCriteriaId\":\"2F29A768-8EF1-4F50-A78D-56BC9BE41484\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:rome:-:*:*:*:embedded:*:*:*\",\"matchCriteriaId\":\"95D58B14-392D-4F65-8FF0-199867D3D2BB\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5300g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"96C827CD-61BA-4FA8-886C-08815FA83D4A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5300g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D857EFE-B24E-4228-BB1E-34F9BC763A11\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5300ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"C252F160-6CBE-42EC-A6AC-82F932348A55\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5300ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6CC472B-1502-402D-B2AC-8A63A69F2A27\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5600g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"73443456-6425-46B1-A602-A326B410FE7A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5600g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8937FABB-B60E-4780-BB6D-B1B99DD69219\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5600ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"4D29447B-3FF9-4B29-AA00-5179E54A2991\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5600ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B83F1F6-64B1-40D3-817A-E27CEB2E93EC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5600x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"07E151CD-DED7-4900-8346-7CC60447A3D5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5600x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6CE435D-B9E9-43D6-AFBC-74E258DC4DFA\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5700g_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"C14D153C-8CC3-40B2-B694-08C4FBB67A8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5700g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20F5FCF8-FDDA-43F6-AFFD-1874DB2BB806\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5700ge_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"47E4A102-1306-481F-96D5-3F677FE54152\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5700ge:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA1A9BEC-27AB-40AD-BBED-4420451D3793\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5800x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"D1FF208E-2271-440D-9398-2807CBF87233\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5800x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"48F6B331-4C0F-49FF-A39F-381B9ADE3483\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5800x3d_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"CA8CD6DB-42C5-4584-8E22-090614949DF3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5800x3d:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"238EA54F-4809-4D8F-9F18-71135FED9D05\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5900x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"7872EB6C-5C3D-4804-9934-53BD91A0B88E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5900x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"050C802C-D8C7-4D58-BA6E-AC48EEF25215\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:ryzen_5950x_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0004\",\"matchCriteriaId\":\"48018BD4-08DF-4D87-A6AD-251236FD673E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:ryzen_5950x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD9478CC-DF88-4833-BBB2-2D82D9BBFA63\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:snowy_owl_r1000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.32.50.0018\",\"matchCriteriaId\":\"5E840A2C-A5BA-4054-A932-07B1AED61C3E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:snowy_owl_r1000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AA109B5-E052-4944-AA5C-96B6E8842902\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:snowy_owl_r2000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0005\",\"matchCriteriaId\":\"2CFD31CB-623F-46E9-B181-AC5D96349A47\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:snowy_owl_r2000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1963FD6B-57F6-4CDC-A92B-20079526ACB0\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:snowy_owl_v2000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0007\",\"matchCriteriaId\":\"4A998C25-E37C-4987-AFBE-91AA6F324A0E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:snowy_owl_v2000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5EACEBA7-F35C-4FCD-B146-4E1A274B8E3B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:amd:snowy_owl_v3000_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.30.0007\",\"matchCriteriaId\":\"669E1226-DA98-4A6B-BF79-602258AAFC80\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:amd:snowy_owl_v3000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61FA4046-4CD6-4592-B972-1C2ADD4978D1\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:alder_lake_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.23.0047\",\"matchCriteriaId\":\"5A94F47D-AC22-44FF-A9F9-B3709D5A0897\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:alder_lake:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E39D7884-8579-4B0C-BC50-66DFE48583A5\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:bakerville_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.21.51.0026\",\"matchCriteriaId\":\"9238729D-BE76-4DDE-B3BC-04AA0E96EDF7\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:bakerville:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DBB308D-E36F-4ECD-8DFF-3784FCECDBEC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:cedar_island_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.42.11.0021\",\"matchCriteriaId\":\"C9165049-02FB-436E-84CD-0F1C9376CF5D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:cedar_island:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3EEA11CC-5BB3-41FF-AAC5-2A74C3E862F2\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:idaville_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.43.12.0052\",\"matchCriteriaId\":\"01F0F8C2-28B8-4670-A47F-999B98A2F6CB\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:idaville:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"25C6C611-A06F-4855-B224-C05CD6EBA88F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:comet_lake-s_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.43.12.0052\",\"matchCriteriaId\":\"CB35619B-30AB-4F2F-BBE9-B382AB2A20A2\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:comet_lake-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"20A2F526-3B6E-433A-9CCC-471686292193\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:tiger_lake_h\\\\/up3_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.43.12.0052\",\"matchCriteriaId\":\"5984089E-3004-476E-A0EA-8B745EDB5D8C\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:tiger_lake_h\\\\/up3:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D856B7FC-16F1-490E-AB0C-14FFB14718A7\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:whiskey_lake_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.43.12.0052\",\"matchCriteriaId\":\"489E0210-427F-4D52-B184-B908EC13325F\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:whiskey_lake:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66A81E2D-E1A6-4B0F-B7F3-C76927598E1C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:denverton_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.10.12.0042\",\"matchCriteriaId\":\"E1978C90-172F-49AE-8F2C-C5FEDAFF9F30\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:denverton:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A70CCE3F-ED5E-4186-84C7-69B58839E386\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:eagle_stream_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.44.25.0052\",\"matchCriteriaId\":\"B2FB3A30-921A-45AF-AE16-9C3BCECB1125\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:eagle_stream:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F85CBD5-5CE0-4A52-8996-4674CF17D5CC\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:grangeville_de_ns_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.27.26.0023\",\"matchCriteriaId\":\"C665AF80-C500-4A94-BD6C-8A4ECB8FB64E\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:grangeville_de_ns:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64D791A1-0735-4C4C-A0BB-D2D96790C3F9\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:granville_de_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.05.15.0038\",\"matchCriteriaId\":\"EF2F487C-0A2C-4828-88D1-04C5C98AD56A\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:granville_de:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4270D4E-9FC2-475B-93BD-A5CB6D565B28\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:greenlow_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.10.12.0042\",\"matchCriteriaId\":\"17DFAFE0-1E3E-408C-9FD6-7174C07CF909\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:greenlow:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44431D1A-D10F-414D-A400-0C5C4F06F99C\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:greenlow-r_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.10.12.0042\",\"matchCriteriaId\":\"C5B3B4F7-A7D4-4BC1-9A18-B71298FF4C52\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:greenlow-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"401E968C-3B59-4200-953F-0050DBA90E46\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:mehlow_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.10.12.0042\",\"matchCriteriaId\":\"7B7BD8DE-932E-4EA7-A010-E1B18AA8E982\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:mehlow:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DBE1F12-551F-4AEF-81A1-E6A588C1C45F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:mehlow-r_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.10.12.0042\",\"matchCriteriaId\":\"41AFCB8E-A4D9-4A0C-9088-57BA643E05A5\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:mehlow-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C701B92D-AF94-459B-BC6A-612111555231\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:tatlow_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.10.12.0042\",\"matchCriteriaId\":\"97883F64-02E6-46C8-A70B-A01E120A0FF3\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:tatlow:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84719A8D-75B1-42F7-A568-F7FD501F8B1F\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:purley-r_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.21.51.0048\",\"matchCriteriaId\":\"7EDB05C1-3989-4E5F-A560-0E3A8449124D\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:purley-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"43D86D5A-334F-418F-88BE-2A24B06E80A6\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:intel:whitley_firmware:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"05.42.23.0066\",\"matchCriteriaId\":\"354D107D-B11F-4A10-A50B-8C22E5B93C16\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:intel:whitley:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F449054E-C729-485F-B5FA-AA49FF0D0294\"}]}]}],\"references\":[{\"url\":\"https://www.insyde.com/security-pledge\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.insyde.com/security-pledge/SA-2022060\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.insyde.com/security-pledge\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.insyde.com/security-pledge/SA-2022060\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.